CVE-2022-32230
Vulnerability from cvelistv5
Published
2022-06-14 21:40
Modified
2024-09-16 23:36
Severity ?
EPSS score ?
Summary
Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 20H2 |
Version: 19042.1706 < 19042.1706 Version: 19043.1706 < 19043.1706 Version: 19044.1706 < 19043.1706 |
||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T07:39:50.459Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Windows 10 Version 20H2", vendor: "Microsoft", versions: [ { lessThan: "19042.1706", status: "affected", version: "19042.1706", versionType: "custom", }, { lessThan: "19043.1706", status: "affected", version: "19043.1706", versionType: "custom", }, { lessThan: "19043.1706", status: "affected", version: "19044.1706", versionType: "custom", }, ], }, { product: "Windows Server Version 20H2", vendor: "Microsoft", versions: [ { lessThan: "19042.1706", status: "affected", version: "19042.1706", versionType: "custom", }, { lessThan: "19043.1706", status: "affected", version: "19043.1706", versionType: "custom", }, { lessThan: "19044.1706", status: "affected", version: "19044.1706", versionType: "custom", }, ], }, { product: "Windows 10 Version 21H1", vendor: "Microsoft", versions: [ { lessThan: "19042.1706", status: "affected", version: "19042.1706", versionType: "custom", }, { lessThan: "19043.1706", status: "affected", version: "19043.1706", versionType: "custom", }, { lessThan: "19044.1706", status: "affected", version: "19044.1706", versionType: "custom", }, ], }, { product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "19042.1706", status: "affected", version: "19042.1706", versionType: "custom", }, { lessThan: "19043.1706", status: "affected", version: "19043.1706", versionType: "custom", }, { lessThan: "19044.1706", status: "affected", version: "19044.1706", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Spencer McIntyre of Rapid7", }, ], datePublic: "2022-06-14T00:00:00", descriptions: [ { lang: "en", value: "Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.", }, ], exploits: [ { lang: "en", value: "Metasploit module: https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476 NULL Pointer Dereference", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-06-14T21:40:12", orgId: "9974b330-7714-4307-a722-5648477acda7", shortName: "rapid7", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", }, { tags: [ "x_refsource_MISC", ], url: "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504", }, ], solutions: [ { lang: "en", value: "This was fixed as a stability issue in the April, 2022 Patch Tuesday set from Microsoft.", }, ], source: { discovery: "EXTERNAL", }, title: "SMBv3 FileNormalizedNameInformation NULL Pointer Dereference", x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@rapid7.com", DATE_PUBLIC: "2022-06-14T17:00:00.000Z", ID: "CVE-2022-32230", STATE: "PUBLIC", TITLE: "SMBv3 FileNormalizedNameInformation NULL Pointer Dereference", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Windows 10 Version 20H2", version: { version_data: [ { version_affected: "<", version_name: "19042.1706", version_value: "19042.1706", }, { version_affected: "<", version_name: "19043.1706", version_value: "19043.1706", }, { version_affected: "<", version_name: "19044.1706", version_value: "19043.1706", }, ], }, }, { product_name: "Windows Server Version 20H2", version: { version_data: [ { version_affected: "<", version_name: "19042.1706", version_value: "19042.1706", }, { version_affected: "<", version_name: "19043.1706", version_value: "19043.1706", }, { version_affected: "<", version_name: "19044.1706", version_value: "19044.1706", }, ], }, }, { product_name: "Windows 10 Version 21H1", version: { version_data: [ { version_affected: "<", version_name: "19042.1706", version_value: "19042.1706", }, { version_affected: "<", version_name: "19043.1706", version_value: "19043.1706", }, { version_affected: "<", version_name: "19044.1706", version_value: "19044.1706", }, ], }, }, { product_name: "Windows 10 Version 21H2", version: { version_data: [ { version_affected: "<", version_name: "19042.1706", version_value: "19042.1706", }, { version_affected: "<", version_name: "19043.1706", version_value: "19043.1706", }, { version_affected: "<", version_name: "19044.1706", version_value: "19044.1706", }, ], }, }, ], }, vendor_name: "Microsoft", }, ], }, }, credit: [ { lang: "eng", value: "Spencer McIntyre of Rapid7", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.", }, ], }, exploit: [ { lang: "en", value: "Metasploit module: https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", }, ], generator: { engine: "Vulnogram 0.0.9", }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", temporalScore: "7.7", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-476 NULL Pointer Dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/", refsource: "MISC", url: "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/", }, { name: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230", refsource: "CONFIRM", url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230", }, { name: "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", refsource: "MISC", url: "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", }, { name: "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504", refsource: "MISC", url: "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504", }, ], }, solution: [ { lang: "en", value: "This was fixed as a stability issue in the April, 2022 Patch Tuesday set from Microsoft.", }, ], source: { discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "9974b330-7714-4307-a722-5648477acda7", assignerShortName: "rapid7", cveId: "CVE-2022-32230", datePublished: "2022-06-14T21:40:12.731452Z", dateReserved: "2022-06-01T00:00:00", dateUpdated: "2024-09-16T23:36:08.130Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-32230\",\"sourceIdentifier\":\"cve@rapid7.com\",\"published\":\"2022-06-14T22:15:10.450\",\"lastModified\":\"2024-11-21T07:05:58.290\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.\"},{\"lang\":\"es\",\"value\":\"Microsoft Windows SMBv3, sufre una desreferencia de puntero null en las versiones de Windows anteriores al conjunto de parches de abril de 2022. Al enviar una petición SMBv3 FileNormalizedNameInformation malformada a través de una tubería con nombre, un atacante puede causar un bloqueo de Pantalla Azul de la Muerte (BSOD) del kernel de Windows. Para la mayoría de los sistemas, este ataque requiere autenticación, excepto en el caso especial de los controladores de dominio de Windows, donde los usuarios no autenticados siempre pueden abrir tuberías con nombre mientras puedan establecer una sesión SMB. Normalmente, tras el BSOD, el servidor SMBv3 víctima es reiniciado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@rapid7.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cve@rapid7.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2C378B-1507-4C81-82F6-9F599616845A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE4278F-71A7-43E9-8F79-1CBFAE71D730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E65CB9-6DC2-4A90-8C6A-103BEDC99823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8F3DD2-A145-4AF1-8545-CC42892DA3D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200AF17-0458-4315-A9D6-06C8DF67C05B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79EE26-FC32-417D-A49C-A1A63165A968\"}]}]}],\"references\":[{\"url\":\"https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.