{"vulnerability": "CVE-2022-22038", "sightings": [{"uuid": "fc00f1f5-6cd0-4915-9101-2688abb3bb62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22038", "type": "exploited", "source": "https://t.me/avleonovrus/35", "content": "\u041c\u0430\u0439\u043a\u0440\u043e\u0441\u043e\u0444\u0442 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0442\u0432\u043e\u0440\u044f\u0442 \u0434\u0438\u0447\u044c, \u043d\u043e \u044d\u0442\u043e \u043d\u0435 \u043f\u043e\u0432\u043e\u0434 \u043d\u0435 \u043f\u0430\u0442\u0447\u0438\u0442\u044c \u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b. \u0412\u043e \u0432\u0441\u044f\u043a\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u043f\u043e\u043a\u0430. \u041d\u0443 \u0438 \u0442\u043e\u0447\u043d\u043e \u043d\u0435 \u043f\u043e\u0432\u043e\u0434 \u043d\u0435 \u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \ud83d\ude42 \u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0432\u0438\u0434\u044f\u0448\u043a\u0430 \u043f\u0440\u043e \u0438\u044e\u043b\u044c\u0441\u043a\u0438\u0439 Patch Tuesday \u0431\u0443\u0434\u0435\u0442, \u043d\u043e \u043a\u043e\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u043f\u043e\u0440\u0430\u043d\u044c\u0448\u0435, \u0432\u044b\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u044e \u0440\u0435\u043f\u043e\u0440\u0442 Vulristics. \u0422\u0435\u043f\u0435\u0440\u044c \u0432\u0441\u0451 \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c \u043d\u0435\u0441\u0443 \u0432 \u0442\u0435\u043b\u0435\u0436\u0435\u043d\u044c\u043a\u0443 avleonovrus. \ud83d\ude09\n\n\u0427\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u0430\u0437\u0430\u0442\u044c, \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0430\u0446\u0438\u044f \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e. \u0421\u0432\u0435\u0440\u0445\u0443 \u0441\u043f\u0438\u0441\u043a\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u0432\u0436\u0438\u0432\u0443\u044e Elevation of Privilege \u0432 Windows CSRSS (CVE-2022-22047), \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043c\u0435\u0439\u043d\u0441\u0442\u0440\u0438\u043c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430 \u043f\u0440\u043e\u0442\u0440\u0443\u0431\u0438\u043b\u0438. \u041c\u043e\u0436\u043d\u043e \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 SYSTEM. \u041f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0432\u0438\u0434\u043d\u043e. \n\n\u0414\u0430\u043b\u044c\u0448\u0435 \u043c\u0435\u043d\u0435\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. Remote Code Execution \u0432 Remote Procedure Call Runtime (CVE-2022-22038). \u0422\u0443\u0442 \u0443 Microsoft \u0435\u0441\u0442\u044c POC \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430. \u041d\u043e \u0432\u0440\u044f\u0434 \u043b\u0438 \u0434\u043e\u0432\u0435\u0434\u0443\u0442 \u0434\u043e \u0447\u0435\u0433\u043e-\u0442\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e, \u0442.\u043a. Exploitation Less Likely. \n\n\u041c\u0435\u0436\u0434\u0443 \u0438\u044e\u043d\u044c\u0441\u043a\u0438\u043c \u0438 \u0438\u044e\u043b\u044c\u0441\u043a\u0438\u043c Patch Tuesday \u0432\u044b\u0448\u043b\u0430 Memory Corruption \u0432 Microsoft Edge (CVE-2022-2294), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u0438\u0434\u0438\u043c\u043e \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 RCE \u0438 Google \u043f\u0438\u0448\u0443\u0442, \u0447\u0442\u043e \u043e\u043d\u0430 \u0432\u0436\u0438\u0432\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f.   \n\n\u0415\u0449\u0451 \u0437\u0430\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u0432 \u044d\u0442\u043e\u043c Patch Tuesday \u0431\u043e\u043b\u044c\u0448\u0435 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u044b \u0432\u0441\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044d\u0442\u043e EoP. \u0422\u0430\u043a\u0436\u0435 \u043e\u0447\u0435\u043d\u044c \u043c\u043d\u043e\u0433\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Azure Site Recovery. \u0418 EoP, \u0438 RCE, \u0438 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u0441 \u043d\u0435\u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u0443\u0440\u043e\u0432\u043d\u044f \u0437\u0440\u0435\u043b\u043e\u0441\u0442\u0438 POC. \u041f\u043e \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044e  Azure Site Recovery \u044d\u0442\u043e \"Site Recovery is a native disaster recovery as a service (DRaaS)\", \u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u0431\u044b \u0434\u043e\u043b\u0436\u043d\u043e \u043f\u0430\u0442\u0447\u0438\u0442\u044c\u0441\u044f \u0441\u0430\u043c\u0438\u043c\u0438 Microsoft, \u043d\u043e \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 \u0442\u0430\u043c \u0435\u0441\u0442\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 \u0445\u043e\u0441\u0442\u0430\u0445 Microsoft Azure Site Recovery suite \u0438 \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0447\u0430\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044d\u0442\u043e \u0432 \u043d\u0435\u043c. Tenable \u043f\u0440\u043e CVE-2022-33675 \u043f\u0438\u0448\u0443\u0442, \u0447\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e SYSTEM.\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:26:48.000000Z"}, {"uuid": "577cd088-a99f-46ef-8b9c-46ce82f006d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-22038", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=833", "content": "", "creation_timestamp": "2022-07-13T04:00:00.000000Z"}, {"uuid": "34f9ac8a-af1e-4d6e-a8c5-6f8f9898ccd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22038", "type": "published-proof-of-concept", "source": "https://t.me/avleonovrus/36", "content": "\u0412\u0438\u0434\u044f\u0448\u0435\u0447\u043a\u0430 \u043f\u0440\u043e \u0438\u044e\u043b\u044c\u0441\u043a\u0438\u0439 Microsoft Patch Tuesday \u0438 \u043f\u0440\u043e \u0442\u043e, \u0447\u0442\u043e Microsoft \u0442\u0432\u043e\u0440\u0438\u0442 \u0434\u0438\u0447\u044c. \u0412 \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u0435 \u0432\u0441\u0435 \u0442\u043e \u0436\u0435, \u043e \u0447\u0435\u043c \u0442\u0443\u0442 \u043f\u0438\u0441\u0430\u043b. \u041d\u0443 \u0438 \u043f\u0440\u043e \u0440\u0435\u043f\u043e\u0440\u0442 \u043c\u0430\u0439\u043a\u0440\u043e\u0441\u043e\u0444\u0442\u043e\u0432\u0441\u043a\u0438\u0439 \u0442\u043e\u0436\u0435 \u043d\u0430\u043a\u0438\u043d\u0443\u043b \u043d\u0435\u043c\u043d\u043e\u0436\u043a\u043e \u0434\u043b\u044f \u0437\u0430\u0442\u0440\u0430\u0432\u043a\u0438. \ud83d\ude42\n\n\u2014-\n\nHello everyone! Microsoft has been acting weird lately. I mean the recent publication of a propaganda report about evil Russians and how Microsoft is involved in the conflict between countries. It wouldn't be unusual for a US government agency, NSA or CIA to publish such a report. But when a global IT vendor, which, in theory, should be more or less neutral, does this\u2026 This is a clear signal. It's not about business anymore. \n\nI'll take a closer look at this report in the next episode of the Vulnerability Management news, but for now let's take a look at Microsoft July Patch Tuesday. Yes, the vendor is behaving strangely, but Microsoft products need to be patched. Right? At least for now. And tracking vulnerabilities is always a good thing. \ud83d\ude42\n\n01:32 CSRSS Elevation of Privilege (CVE-2022-22047)\n04:36 RPC Remote Code Execution (CVE-2022-22038)\n05:44 Microsoft Edge Memory Corruption (CVE-2022-2294)\n06:55 32 vulnerabilities in Azure Site Recovery\n\nVideo: https://youtu.be/HjfxxcqWrH4\nVideo2 (for Russia): https://vk.com/video-149273431_456239096\nBlogpost: https://avleonov.com/2022/07/23/microsoft-patch-tuesday-july-2022-propaganda-report-csrss-eop-rpc-rce-edge-azure-site-recovery/\nFull report: https://avleonov.com/vulristics_reports/ms_patch_tuesday_july2022_report_with_comments_ext_img.html\n\n@avleonovrus #microsoft #patchtuesday", "creation_timestamp": "2023-10-21T12:56:55.000000Z"}]}