{"vulnerability": "CVE-2022-21882", "sightings": [{"uuid": "6f13a709-95a0-47e1-88e6-d18fc0dd6404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "78df4dc7-491d-4310-b4c5-23819aedeade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971236", "content": "", "creation_timestamp": "2024-12-24T20:26:18.566704Z"}, {"uuid": "fb164e60-241c-4ff1-aefe-0b08b686b363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "11d76935-81aa-436c-a387-bdc3944daf15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21882", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3c7ac2f0-ab00-4981-99a6-22dc41abb667", "content": "", "creation_timestamp": "2026-02-02T12:28:25.536727Z"}, {"uuid": "e01a8af3-f90a-4029-8a2a-1669a8a814f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:43.000000Z"}, {"uuid": "66892d5f-ec05-4906-9382-4ab59a45196b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2022-21882", "type": "seen", "source": "https://gist.github.com/gusztavvargadr/2dbf3265eb87bc6b54859b381ce5ab5a", "content": "", "creation_timestamp": "2025-12-07T23:51:57.000000Z"}, {"uuid": "338ce08d-ac78-4c77-ac13-35f5da9fba89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}, {"uuid": "05b71305-83e7-464c-8aae-334046211115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2022_21882_win32k.rb", "content": "", "creation_timestamp": "2022-02-25T22:15:27.000000Z"}, {"uuid": "5c138554-1f6a-43a7-b2f6-01447d279832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/BabukLockerGroups/60904", "content": "FuckSec Ransomware source code\n\nselling Funksec ransomware Windows source code \nfast scan for all network and disks\nencrypt use ChaCha20-Poly1305 and AES\ngenerate readme\nbypass security , anti detection (0capture) (Trend Micro,SentinelOne,kaspersky,bitdefender)\nAI features include (smart scan , shadow copies , exploit vulns like CVE-2022-21882 to up permission for Spread through networks , anti-security-AI-detection)\ndetect VMwares , tools like ghidra , IDA Pro , Radare2 etc detected\nPrice: 10k$\nPGP:\nhttps://pastebin.com/fX112WxL\n\nContact Us!\nTelegram: \n@shinyspiderss\n\nEmail ID:\nshinyhuntersgroups@tutamail.com\n\nJabber ID:\nShinyHunters@yax.im\n\nXmpp ID:\nshinycorp@xmpp.jp\n\n\nSession ID:\n05ef363433d34f4c93aa6848f0236048ceb5ddb08e54dca2da7afa39ec63952c2e\n\nTox ID:\nA5A1AD478E3782734D6AACE5985E52B43C6B9D779C0CB93E45485C4680822A70BD6CEE\n9E4BE7\n\n~ ShinyHunters", "creation_timestamp": "2025-09-19T12:51:37.000000Z"}, {"uuid": "f8210eb2-6dea-412c-a487-f312dec7b013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8705", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2022-21882: Win32k Elevation of Privilege Vulnerability.\n\nFor Windows 10 21H2 Only.\n\nhttps://github.com/L4ys/CVE-2022-21882", "creation_timestamp": "2022-02-04T08:04:21.000000Z"}, {"uuid": "be3dd332-8c4e-435d-92c3-2522114b079b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/203", "content": "\u041f\u0440\u0438\u0432\u0435\u0442, \u043a\u043e\u0442\u043a\u0438.  \ud83d\udc31\n\u042d\u0442\u043e\u0442 \u043f\u043e\u0441\u0442 \u044f \u0440\u0435\u0448\u0438\u043b\u0430 \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u043a\u0430\u043a \u0441\u0431\u043e\u0440\u043d\u0438\u043a \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u0430, \u043d\u043e \u043d\u0435 \u0431\u0435\u0433\u0438\u0442\u0435 \u0440\u0430\u0441\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u0443\u0442 \u043c\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0433\u043e. \n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u0431\u043e\u0440\u043d\u0438\u043a\u0438 \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u0430,  \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 poc,  \u0438 \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u043a\u0440\u0443\u0442\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438!\ud83d\udd11\n\n\u041f\u0430\u043c - \u0425\u043e\u0440\u043e\u0448\u0430\u044f \u0441\u0442\u0430\u0442\u044c\u044f \u043f\u0440\u043e \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0435\u0432\u0435\u043b\u0438\u043a\u0438\u0439 \u0438 \u043a\u0430\u043a \u044d\u0442\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \n\n\u041f\u0430\u043c -  \u0421\u0442\u0430\u0442\u044c\u044f \u043f\u0440\u043e \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043d\u0430 \u0432\u0438\u043d\u0434\u0435.  \u0412 \u043d\u0435\u0439 \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u044e\u0442\u0441\u044f \u0442\u0435\u043c\u044b \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a:  \u041a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043f\u043e\u0442\u043e\u043a\u0430 \u0438 \u0437\u0430\u0449\u0438\u0442\u0430 \u043e\u0431\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u043f\u043e\u0442\u043e\u043a\u0430; SMEP, \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0430\u044e\u0449\u0438\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u044f\u0434\u0440\u0430; ASLR, DEP \u0438 \u0432\u0441\u0435 \u0442\u0430\u043a\u043e\u0435, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0443\u0442\u0435\u0447\u043a\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u044f\u0434\u0440\u0430; \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 \n\n\u041f\u0430\u043c - \u0421\u0431\u043e\u0440\u043d\u0438\u043a \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u043e\u0432 \u043d\u0430 \u0433\u0438\u0442\u0445\u0430\u0431\u0435 \u043f\u0440\u043e \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0442\u0430\u043c \u0435\u0441\u0442\u044c \u0442\u0430\u043a\u0438\u0435 \u043c\u0430\u0442\u0435\u0440\u044c\u044f\u043b\u044b \u043a\u0430\u043a: \u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u044d\u0442\u043e\u0433\u043e; \u041f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439; \u041f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 EoP \u2014 \u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043d\u0430\u043b\u044b; EoP \u2014 \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044f\u0434\u0440\u0430. \u0418 \u043e\u0447\u0435\u043d\u044c \u043c\u043d\u043e\u0433\u043e \u0447\u0435\u0433\u043e \u0435\u0449\u0435,  \u0434\u0443\u043c\u0430\u044e \u043a\u043e\u043c\u0443-\u0442\u043e \u0442\u043e\u0447\u043d\u043e \u043f\u0440\u0438\u0433\u043e\u0434\u0438\u0442\u044c\u0441\u044f \n\n\u041f\u0430\u043c - \u042d\u0442\u043e\u0442 \u0441\u043a\u0440\u0438\u043f\u0442 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0441 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0435\u0439 Windows, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u041e\u043d \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e , \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u043e\u043b\u0435\u0437\u043d\u0430 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \n\n\u041f\u0430\u043c- \u0421\u0431\u043e\u0440\u043d\u0438\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0434\u043b\u044f \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043d\u0430 windows \u0438 poc \u043d\u0430 \u043d\u0438\u0445.  \u0422\u0430\u043c \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \n\n\u041f\u0430\u043c- \u041f\u0440\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c,  WADComs  \u0448\u043f\u0430\u0440\u0433\u0430\u043b\u043a\u0430, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0430\u044f  \u0441\u043f\u0438\u0441\u043e\u043a \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438,  \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0432 \u0441\u0440\u0435\u0434\u0430\u0445 Windows.\n\n\u041f\u0430\u043c - \u041f\u0440\u043e  CVE 2022-29072 \u2014 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435/\u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u0435 \u0432 Powershell\n\n\u041f\u0430\u043c - \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2022-21999 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440\u0430 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u0435\u0447\u0430\u0442\u0438 Windows, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \n\n\u041f\u0430\u043c - \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u043d\u0430 \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0443\u044e CVE-2022-21882\n\n\u041f\u0430\u043c - \u041d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043c\u0430\u043d\u0443\u043b \u0441 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u0434\u043b\u044f \u043f\u0440\u0435\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-09-30T01:59:22.000000Z"}, {"uuid": "a4b832da-e48c-4b03-a2b9-7a6c92263e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/technical_private_cat/204", "content": "Hello, cats.  \ud83d\udc31\nI decided to make this post as a collection of stuff, but don't get upset, there is a lot of useful stuff here. \nFor example various other compilations of material, various vulnerabilities and poc, and of course cool articles!\ud83d\udd11\n\nLink - A good article about exceeding a threshold and how it works \n\nLink - A good article about overriding privileges on the wind.  It deals with topics such as:  Flow control and reverse flow protection; SMEP, preventing execution of trivial kernel code; ASLR, DEP and stuff like that, including limiting kernel leaks; Using memory corruption \n\nLink - A collection of matertials on the githab about privilege overruns there are matertials like: Tools for this; Enumerating users; Enumerating the EoP network - named channels; EoP - Exploiting the kernel. And a lot more, I think someone will definitely find it useful \n\nLink - This script is for listing common Windows configuration problems that can be used to raise privileges locally. It also collects different information which can be useful for exploiting privilege overrides \n\nLink - A collection of windows privilege override vulnerabilities and poc on them.  There are quite a few different \n\nLink - About security, WADComs cheat sheet containing a list of offensive security tools you can use in Windows environments.\n\nLink - About  CVE 2022-29072 - Powershell detection/mitigation\n\nLink - Exploit for CVE-2022-21999 - Windows Print Queue Manager vulnerability related to privilege gaining \n\nLink - Exploit for notorious CVE-2022-21882\n\nLink - Little manulet with exploits for privilege escalation\n#windows #attacks #cve #exploit", "creation_timestamp": "2022-11-19T11:29:33.000000Z"}, {"uuid": "7d297a2d-ae7a-4828-9e92-25e624c84030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/RFrepoV1Chat/428205", "content": "FuckSec Ransomware source code\n\nselling Funksec ransomware Windows source code \nfast scan for all network and disks\nencrypt use ChaCha20-Poly1305 and AES\ngenerate readme\nbypass security , anti detection (0capture) (Trend Micro,SentinelOne,kaspersky,bitdefender)\nAI features include (smart scan , shadow copies , exploit vulns like CVE-2022-21882 to up permission for Spread through networks , anti-security-AI-detection)\ndetect VMwares , tools like ghidra , IDA Pro , Radare2 etc detected\nPrice: 10k$\nPGP:\nhttps://pastebin.com/fX112WxL\n\nContact Us!\nTelegram: \n@shinyspiderss\n\nEmail ID:\nshinyhuntersgroups@tutamail.com\n\nJabber ID:\nShinyHunters@yax.im\n\nXmpp ID:\nshinycorp@xmpp.jp\n\n\nSession ID:\n05ef363433d34f4c93aa6848f0236048ceb5ddb08e54dca2da7afa39ec63952c2e\n\nTox ID:\nA5A1AD478E3782734D6AACE5985E52B43C6B9D779C0CB93E45485C4680822A70BD6CEE\n9E4BE7\n\n~ ShinyHunters", "creation_timestamp": "2025-09-19T12:51:38.000000Z"}, {"uuid": "8b6a92c8-e2a6-44cd-9120-6c247eeda958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1414", "content": "CVE 2022-21882 PoC\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 Win32k\nhttps://github.com/sailay1996/cve-2022-21882-poc\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-04-28T08:31:43.000000Z"}, {"uuid": "d5d3aaa4-1abe-4a8d-bda0-0d94a8afcd55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/habr_com_news/3088", "content": "\u200b\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0432\u044b\u043b\u043e\u0436\u0438\u043b LPE-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2022-21882 \u0434\u043b\u044f Windows 10\n\n\u041f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 Bleeping Computer, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a KaLendsi \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u043d\u0430 GitHub \u0440\u0430\u0431\u043e\u0447\u0438\u0439 LPE-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f Windows 10 CVE-2022-21882. \u0421 \u0435\u0433\u043e \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f SYSTEM. \n \n\u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u0432 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u043e\u043c \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Microsoft. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows 10, \u0432 Windows 11 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442. \u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043c\u043d\u043e\u0433\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u044b \u0442\u0430\u043a \u0438 \u043d\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0435\u0449\u0435 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u0438\u0435 \u043f\u0430\u0442\u0447\u0438 \u0438\u0437-\u0437\u0430 \u0432 \u043e\u0448\u0438\u0431\u043e\u043a \u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0441 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u043f\u0430\u0442\u0447\u0430\u043c\u0438 \u0442\u0430\u043c \u2014 \u0443 \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043d\u0430\u0447\u0430\u043b\u0438 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c\u0441\u044f \u043d\u0435\u0448\u0442\u0430\u0442\u043d\u043e, \u0432\u043e\u0437\u043d\u0438\u043a\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u0440\u0438 \u0440\u0430\u0431\u043e\u0442\u0435 L2TP VPN \u0438 Hyper-V.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Windows10", "creation_timestamp": "2022-01-30T09:45:57.000000Z"}, {"uuid": "795f97b6-8aa6-42cd-ab92-c6015749d59e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://t.me/poxek/975", "content": "CVE-2022-21882 Windows Privilege Escalation\n\u25b6 \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \u2705", "creation_timestamp": "2022-03-04T14:02:01.000000Z"}, {"uuid": "56a81f16-1335-45ff-a2e8-f02c776d1877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "exploited", "source": "https://t.me/ctinow/46466", "content": "CISA orders federal agencies to fix actively exploited CVE-2022-21882 Windows flaw\n\nhttps://ift.tt/74oFqiw", "creation_timestamp": "2022-02-05T10:41:18.000000Z"}, {"uuid": "0fe5eed5-5a33-4722-b3ef-45cd7ca1f96e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "Telegram/J3IjoSvajP7ZHOpEn39r3_JEaAYB-xCzSflTCYDbaWxOFKg", "content": "", "creation_timestamp": "2023-06-04T05:15:35.000000Z"}, {"uuid": "89582c59-ff47-4e2b-bf93-0fef39e1fb4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://t.me/poxek/1017", "content": "CVE-2022-21882 Windows Privilege Escalation\n\u25b6\ufe0f \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-03-09T10:01:59.000000Z"}, {"uuid": "9caecdb0-5c88-4ae7-ac87-61fa97da36c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/poxek/1916", "content": "CVE-2022-21882\nWin32k Elevation of Privilege Vulnerability\nhttps://github.com/L4ys/CVE-2022-21882\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1", "creation_timestamp": "2022-07-05T17:01:49.000000Z"}, {"uuid": "f42dcbe6-01b5-4d6c-821d-42082d448c5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/cyberbannews_ir/4980", "content": "\ud83d\uded1\u0627\u0646\u062a\u0634\u0627\u0631 \u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u062c\u062f\u06cc\u062f \u0628\u0631\u0627\u06cc \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc \u062f\u0631 \u0648\u06cc\u0646\u062f\u0648\u0632\n\n\u06a9\u062f\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u062c\u062f\u06cc\u062f\u06cc \u0628\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2022-21882 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0647 \u06a9\u0647 \u0645\u062c\u0648\u0632 \u0627\u062f\u0645\u06cc\u0646 \u0634\u062f\u0646 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0647\u0631 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0635\u0627\u062f\u0631 \u0645\u06cc \u06a9\u0646\u0646\u062f\n\n#\u0633\u06cc\u0633\u062a\u0645_\u0639\u0627\u0645\u0644\n\n\u2705 \u0628\u06cc\u0634\u062a\u0631 \u0628\u062e\u0648\u0627\u0646\u06cc\u062f:\nhttps://bit.ly/3J5smD9\n\n@cyberbannews_ir", "creation_timestamp": "2022-01-30T09:43:14.000000Z"}, {"uuid": "dcc9fb96-9415-4068-9de4-321281f3e606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/46070", "content": "Expert releases PoC for CVE-2022-21882 Windows local privilege elevation issue\n\nhttps://ift.tt/nBwrO57vo", "creation_timestamp": "2022-01-30T19:31:35.000000Z"}, {"uuid": "f84846cd-b429-4bcf-9586-a646263fb91a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/616", "content": "\u041b\u044e\u0431\u0438\u0442\u0435 \u0438\u0440\u043e\u043d\u0438\u044e ? \u0430 \u043f\u043e\u0441\u0442\u0418\u0440\u043e\u043d\u0438\u044e ? )))\n\u0434\u044b\u043a \u0432\u043e\u0442, \u0432\u0441\u0435\u0433\u0434\u0430 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0442\u044c \u043a\u0430\u043a \u0437\u043c\u0435\u044f \u0436\u0440\u0435\u0442 \u0441\u0432\u043e\u0439 \u0445\u0432\u043e\u0441\u0442.\n\u0415\u0441\u0442\u044c \u0442\u0430\u043a\u0430\u044f CVE-2022-21882, \u043e\u0434\u0438\u043d \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c - \u043d\u0435 \u0434\u043e\u0436\u0434\u0430\u043b\u0441\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0441\u043b\u0430\u0434\u043a\u043e\u0433\u043e \u0448\u0435\u043a\u0435\u043b\u044f \u0438 \u0436\u0438\u0434\u043a\u043e \u043d\u0430\u0432\u0430\u043b\u0438\u043b \u0432 \u043f\u0430\u0431\u043b\u0438\u043a \u0441\u043f\u043b\u043e\u0438\u0442\u043e\u043c (LPE), \u0432\u0441\u0435 \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u043e\u0442 user \u0434\u043e system.\n\u0410 \u0438\u0440\u043e\u043d\u0438\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f microsoft \u043b\u0435\u0436\u0438\u0442 \u043d\u0430 github, \u043f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0438\u0439 microsoft.\n\u0412\u043e\u0437\u0432\u044b\u0441\u0438\u0442\u044c\u0441\u044f \u0434\u043e system \u043c\u043e\u0436\u043d\u043e \u0442\u0443\u0442", "creation_timestamp": "2022-02-04T19:03:16.000000Z"}, {"uuid": "5aaca149-76ab-4224-a429-5ee0d26f1a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "Telegram/2jTzM1VAoXIkiMXK7HcwF_lq0LsdA919AxcX2QsY-Gq9ffFh", "content": "", "creation_timestamp": "2025-02-14T10:03:59.000000Z"}, {"uuid": "c3f0c63c-95f7-4c7a-85ed-2023f937eeed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1163", "content": "CVE-2022-21882 LPE:\n\nhttps://github.com/KaLendsi/CVE-2022-21882\n\n#git #exploit", "creation_timestamp": "2022-05-31T08:02:15.000000Z"}, {"uuid": "1c9e77d8-8d84-445d-bfe6-4588925e0560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://t.me/true_secator/3129", "content": "\u041d\u0430\u0441\u0442\u0443\u043f\u0430\u0442\u044c \u043d\u0430 \u0442\u0435 \u0436\u0435 \u0433\u0440\u0430\u0431\u043b\u0438 \u0432 \u043c\u0438\u0440\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 - \u043d\u043e\u0440\u043c\u0430\u043b\u044c\u043d\u0430\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0430, \u0430 \u201c\u043b\u0430\u0442\u0430\u0442\u044c \u0434\u044b\u0440\u044b\u201d \u043f\u043e\u0440\u043e\u0439, \u0441\u0442\u043e\u0438\u0442 \u0431\u043e\u043b\u0435\u0435 \u043e\u0441\u043d\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e. \n\n\u0421\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043e \u0447\u0435\u043c \u0440\u0435\u0447\u044c, \u0430 \u0432\u043e\u0442 \u043e \u0447\u0435\u043c: \u043f\u043e \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0430 Google Project Zero \u0437\u0430 \u043f\u0435\u0440\u0432\u0443\u044e \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0443 2022 \u0433\u043e\u0434\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 18 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0430 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u043d\u0435 \u0431\u044b\u043b\u0438 \u0434\u043e\u043b\u0436\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u0430 \u041c\u044d\u0434\u0434\u0438 \u0421\u0442\u043e\u0443\u043d\u0430 9 \u0438\u0437 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 0-day, \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0432\u0448\u0438\u0445\u0441\u044f \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443, \u043c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c, \u0435\u0441\u043b\u0438 \u0431\u044b \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0430 4 \u043e\u0448\u0438\u0431\u043a\u0438 2022 \u0433\u043e\u0434\u0430 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430\u043c\u0438 \u043d\u0443\u043b\u0435\u0432\u044b\u0445 \u0434\u043d\u0435\u0439 2021 \u0433\u043e\u0434\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u0421\u0430\u043c\u0430\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0438\u0437 \u044d\u0442\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Follina \u0432 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 Windows, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2022-30190, \u043f\u043e \u0441\u0443\u0442\u0438 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f MSHTML, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0439 \u043a\u0430\u043a CVE-2021-40444.\n\nCVE-2022-21882 \u2014 \u044d\u0442\u043e \u0435\u0449\u0435 \u043e\u0434\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Windows, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0430\u044f \u0441\u043e\u0431\u043e\u0439 \u0440\u0430\u0437\u043d\u043e\u0432\u0438\u0434\u043d\u043e\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u0430 \u0438\u043c\u0435\u043d\u043d\u043e CVE-2021-1732 .\n\n\u041e\u0448\u0438\u0431\u043a\u0430 iOS IOMobileFrameBuffer (CVE-2022-22587) \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0435\u0439 \u0442\u0438\u043f\u043e\u0432 \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 Chrome V8 (CVE-2022-1096) \u2014 \u044d\u0442\u043e \u0434\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443 \u2014 CVE-2021-30983 \u0438 CVE-2021-30551 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e.\n\n\u0414\u0440\u0443\u0433\u0438\u043c\u0438 0-day 2022 \u0433\u043e\u0434\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430\u043c\u0438 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f CVE-2022-1364 (Chrome), CVE-2022-22620 (WebKit), CVE-2021-39793 (Google Pixel), CVE-2022-26134 (Atlassian Confluence) \u0438 CVE-2022-26925 (\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Windows \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043a\u0430\u043a PetitPotam).\n\n\u0412 \u043e\u0431\u0449\u0435\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0442\u0430\u043a, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043c\u043e\u0433\u043b\u0438 \u0432\u0435\u0440\u043d\u0443\u0442\u044c\u0441\u044f \u0438 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0443\u0433\u0438\u043c \u043f\u0443\u0442\u0435\u043c \u043b\u0438\u0431\u043e \u0441\u043d\u043e\u0432\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0442\u0435 \u0436\u0435 \u043e\u0448\u0438\u0431\u043a\u0438.\n\n\u042d\u0442\u043e \u0432\u0441\u0435\u0433\u0434\u0430 \u0433\u0440\u043e\u043c\u043a\u043e \u0438 \u0431\u043e\u043b\u044c\u043d\u043e, \u043d\u043e \u043e\u0442\u0447\u0430\u0441\u0442\u0438 \u0445\u043e\u0440\u043e\u0448\u043e \u043a\u043e\u0433\u0434\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b 0-day \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u0442\u0430\u043a \u043a\u0430\u043a \u044d\u0442\u043e \u043d\u0435\u0443\u0434\u0430\u0447\u0430 \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432, \u0430 \u0434\u043b\u044f \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0430 \u044d\u0442\u043e \u043f\u043e\u0434\u0430\u0440\u043e\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0437\u043d\u0430\u0442\u044c \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u0435 \u0438 \u043f\u0440\u0438\u043d\u044f\u0442\u044c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b, \u0447\u0442\u043e\u0431\u044b \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e\u0442 \u0432\u0435\u043a\u0442\u043e\u0440 \u043d\u0435\u043b\u044c\u0437\u044f \u0431\u0443\u0434\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0432 \u0431\u0443\u0434\u0443\u0449\u0435\u043c.\n\n\u0427\u0442\u043e\u0431\u044b \u0434\u043e\u043b\u0436\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Google \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c \u0438 \u0434\u0440\u0443\u0433\u0438\u043c \u043d\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043c\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0432\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432 \u0430\u043d\u0430\u043b\u0438\u0437 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u0447\u0438\u043d \u0438 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u043e\u0432 \u0432\u043e\u0437\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u043e\u0448\u0438\u0431\u043e\u043a, \u0430\u043d\u0430\u043b\u0438\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0438 \u0430\u043d\u0430\u043b\u0438\u0437 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f.", "creation_timestamp": "2022-07-04T20:00:05.000000Z"}, {"uuid": "04342d23-b1e1-46a5-9ceb-c1fc2039d5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "exploited", "source": "https://t.me/true_secator/2574", "content": "\u041c\u044b \u0443\u0436\u0435 \u043f\u0438\u0441\u0430\u043b\u0438 \u043e \u0442\u043e\u043c, \u043a\u0430\u043a \u043a\u043b\u0438\u0435\u043d\u0442\u044b Microsoft \u0441\u0442\u0430\u043b\u0438 \u0437\u0430\u043b\u043e\u0436\u043d\u0438\u043a\u0430\u043c\u0438 \u0442\u0440\u0443\u0434\u043d\u043e\u0433\u043e \u0432\u044b\u0431\u043e\u0440\u0430: \u043d\u0430\u043a\u0430\u0442\u0438\u0442\u044c \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u0438\u0439 PatchTuesday (\u0438 \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u0442\u044c\u0441\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 L2TP, VPN, ReFS \u0438 Hyper-V) \u0438\u043b\u0438 \u0436\u0435 \u043e\u0442\u043a\u0430\u0442\u0438\u0442\u044c\u0441\u044f \u043a \u0440\u0430\u0431\u043e\u0442\u043e\u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438. \u0410 \u0432\u044b\u0431\u043e\u0440 \u0432\u0441\u0435 \u0436\u0438 \u043f\u0440\u0438\u0434\u0435\u0442\u0441\u044f \u0441\u0434\u0435\u043b\u0430\u0442\u044c.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u00a0RyeLv \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 CVE-2022-21882, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432 Windows 10 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u0430\u0432\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438\u043b\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Win32k.sys.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Win32k \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u044f\u043d\u0432\u0430\u0440\u0441\u043a\u0438\u043c PatchTuesday \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u043b\u0430 \u0441\u043e\u0431\u043e\u0439 \u043e\u0431\u0445\u043e\u0434\u0430 \u0440\u0430\u043d\u0435\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00a0CVE-2021-1732. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443 \u043c\u043e\u0433\u0443\u0442 \u043b\u0435\u0433\u043a\u043e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043c\u043e\u0447\u044c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c\u0441\u044f \u043f\u043e \u0441\u0435\u0442\u0438, \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u043d\u043e\u0432\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\n\u0420\u0430\u0431\u043e\u0442\u043e\u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0443\u0436\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0430\u043d\u0430\u043b\u0438\u0442\u0438\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 CERT/CC \u0423\u0438\u043b\u043b \u0414\u043e\u0440\u043c\u0430\u043d\u043d.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u043f\u043e\u043f\u0430\u0434\u0430\u043b\u0430 \u0432 \u043f\u043e\u043b\u0435 \u0437\u0440\u0435\u043d\u0438\u044f \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0414\u0436\u0438\u043b\u0430 \u0414\u0430\u0431\u0430\u0445\u0430, \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0430\u00a0Piiano, \u0440\u0435\u0448\u0438\u0432\u0448\u0438\u043c \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u043e\u0448\u0438\u0431\u043a\u0443\u00a0\u043f\u043e\u0441\u043b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f Microsoft \u0443\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f\u00a0\u043f\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043e\u043a. \u0418 \u044d\u0442\u043e \u0432\u0441\u0435 \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e CVE-2021-1732 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c APT Bitter (\u0430\u0437\u0438\u0430\u0442\u0441\u043a\u0430\u044f \u043f\u0440\u043e\u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u0430\u044f \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0430\u044f \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043f\u043e \u041f\u0430\u043a\u0438\u0441\u0442\u0430\u043d\u0443 \u0438 \u041a\u0438\u0442\u0430\u044e, \u0437\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0441\u0442\u043e\u0438\u0442 \u0418\u043d\u0434\u0438\u044f) \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c, \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0432\u0448\u0438\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430 \u044f\u043d\u0432\u0430\u0440\u044c 2022 \u0433\u043e\u0434\u0430, \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u044d\u0442\u043e \u043f\u043e\u0441\u043a\u043e\u0440\u0435\u0435, \u043f\u043e\u043c\u043d\u044f \u0438\u0441\u0442\u043e\u0440\u0438\u044e \u043f\u0440\u0435\u0434\u0448\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u0438\u043a\u0430 CVE-2022-21882.", "creation_timestamp": "2022-01-31T17:10:00.000000Z"}, {"uuid": "3d30d1a7-47aa-47c5-ab4c-4dd1075dc4d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/hack_room_channel/206", "content": "https://github.com/KaLendsi/CVE-2022-21882", "creation_timestamp": "2022-01-31T20:16:30.000000Z"}, {"uuid": "b7d5c0de-55c3-4439-b0e7-18a7bf85d606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/intelexch/7715", "content": "https://github.com/KaLendsi/CVE-2022-21882", "creation_timestamp": "2022-02-02T23:37:59.000000Z"}, {"uuid": "dbd2a53c-5551-4bd9-a9ad-d9961e501fbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/2452", "content": "https://www.avira.com/en/blog/anatomy-of-an-exploit-in-windows-win32k-cve-2022-21882", "creation_timestamp": "2022-09-06T12:51:39.000000Z"}, {"uuid": "6be17865-34a9-44b8-91c2-cccd9d34d701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/reconshell/1204", "content": "CVE-2022-21882 Windows Privilege Escalation\n\n#CVE-2022-21882 #Windows #PrivilegeEscalation\n#win32k #Hacking #VAPT #Exploit #Malware\n\nhttps://reconshell.com/cve-2022-21882-windows-privilege-escalation/", "creation_timestamp": "2022-03-03T19:48:01.000000Z"}, {"uuid": "ba150627-faac-4d00-9985-af5c36e2d4f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "exploited", "source": "https://t.me/thehackernews/1861", "content": "CISA, the U.S. cybersecurity agency, has ordered all federal agencies to immediately and mandatorily secure their systems against an actively exploited vulnerability (CVE-2022-21882) in Microsoft Windows operating systems.\n\nDetails: https://thehackernews.com/2022/02/cisa-orders-federal-agencies-to-patch.html", "creation_timestamp": "2022-02-07T06:05:20.000000Z"}, {"uuid": "4c56d421-f8fc-490a-a76a-b626ad1c4688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1673", "content": "#exploit\nCVE-2022-21882:\nWin32k Window Object Type Confusion\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-21882.html\n]-&gt; PoC: https://github.com/KaLendsi/CVE-2022-21882\n\n@BlueRedTeam", "creation_timestamp": "2022-01-30T14:31:48.000000Z"}, {"uuid": "216fd44a-5dba-4eeb-aba5-06f1a4ae0e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://t.me/BlueRedTeam/1663", "content": "#exploit\n1. CVE-2022-21882:\nwin32k LPE bypass CVE-2021-1732\nhttps://github.com/KaLendsi/CVE-2022-21882\n// tested on windows 20h2 19042\n\n2. Technical Analysis of CVE-2022-22583:\nBypassing macOS System Integrity Protection (SIP)\nhttps://perception-point.io/technical-analysis-of-cve-2022-22583-bypassing-macos-system-integrity-protection\n\n@BlueRedTeam", "creation_timestamp": "2023-04-04T19:41:45.000000Z"}, {"uuid": "576b1f8c-ee38-4247-843e-3f7351fbe328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/5242", "content": "#exploit\n\"Win32k Vulnerability Dead?\nTaking win32k Exploitation To The Next Level\", 2024.\n\n// CVE-2021-41357, CVE-2023-28274, CVE-2022-21882, CVE-2022-26914, CVE-2022-41113", "creation_timestamp": "2024-11-25T13:03:20.000000Z"}, {"uuid": "3ef8a9ac-7d95-4bc2-8292-6711c0937e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5293", "content": "#exploit\n1. CVE-2022-21882:\nwin32k LPE bypass CVE-2021-1732\nhttps://github.com/KaLendsi/CVE-2022-21882\n// tested on windows 20h2 19042\n\n2. Technical Analysis of CVE-2022-22583:\nBypassing macOS System Integrity Protection (SIP)\nhttps://perception-point.io/technical-analysis-of-cve-2022-22583-bypassing-macos-system-integrity-protection", "creation_timestamp": "2022-01-28T12:07:13.000000Z"}, {"uuid": "6358cb84-b464-4678-a7c7-41f561d56903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5306", "content": "#exploit\nCVE-2022-21882:\nWin32k Window Object Type Confusion\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-21882.html\n]-&gt; PoC: https://github.com/KaLendsi/CVE-2022-21882", "creation_timestamp": "2022-01-30T13:37:01.000000Z"}, {"uuid": "b0021c83-978d-4b5c-82bf-0ed2797b65c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5324", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (Jan 1-31)\n\nCVE-2021-44228 - Apache Log4j2\nCVE-2021-40444 - Microsoft MSHTML RCE\nCVE-2021-4034 - LPE vuln was found on polkit's pkexec utility\nCVE-2022-0185 - Linux Kernel Container Escape in Kubernetes\nCVE-2022-21907 - HTTP Protocol Stack RCE\nCVE-2022-21882 - Win32k Window Object Type Confusion\nCVE-2021-20038 - SonicWall SMA-100 Unauth RCE\nCVE-2021-45467 - CWP CentOS Web Panel preauth RCE\nCVE-2021-42392 - Unauth RCE in H2 Database Console\nCVE-2022-21658 - Vulnerability in Rust", "creation_timestamp": "2024-10-15T10:29:54.000000Z"}, {"uuid": "3d675b91-5801-4fc5-98c0-dea837dabaf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11481", "content": "#exploit\n\"Win32k Vulnerability Dead?\nTaking win32k Exploitation To The Next Level\", 2024.\n\n// CVE-2021-41357, CVE-2023-28274, CVE-2022-21882, CVE-2022-26914, CVE-2022-41113", "creation_timestamp": "2024-11-25T22:22:32.000000Z"}, {"uuid": "da9f3436-4e0b-469b-bcfe-5cd14b021e2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21882", "type": "published-proof-of-concept", "source": "Telegram/clcEmNxhZcHi4To_RQ1A8YVZFlVzgq1IWTEDSznqQFJxcxU", "content": "", "creation_timestamp": "2022-10-07T02:04:31.000000Z"}]}