{"vulnerability": "CVE-2022-22718", "sightings": [{"uuid": "9d858c95-ddd3-41a4-b8d8-d87ed9a2f303", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "4ac5cd4f-18ce-473b-a00e-55caffe837db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971529", "content": "", "creation_timestamp": "2024-12-24T20:30:42.691726Z"}, {"uuid": "7e80ca3e-6c72-4629-a0d1-ebd079820ca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:34.000000Z"}, {"uuid": "c386dba3-b20d-488f-bfd8-3c0a58b5b56c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3luo32qoaxcw2", "content": "", "creation_timestamp": "2025-07-23T22:30:33.416094Z"}, {"uuid": "313b10ca-05cf-4228-ac56-34295607d7ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3luo44bnhwho2", "content": "", "creation_timestamp": "2025-07-23T22:49:22.988686Z"}, {"uuid": "1bead34a-4c31-4d88-b8df-f8083cd6e628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2022-22718", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=736", "content": "", "creation_timestamp": "2022-02-09T04:00:00.000000Z"}, {"uuid": "3e83f4b3-2955-4212-88d5-0f90bd1eabdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8744", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2022-22718 local privilege escalation exploit for Windows Printer Spooler \ud83d\udda8 \n\nhttps://github.com/ly4k/SpoolFool", "creation_timestamp": "2022-02-09T07:54:14.000000Z"}, {"uuid": "82151f01-edf4-40e5-9b32-fd7e53c640fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-22718", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8f6c2efa-2961-41ec-9bf7-f184db76aaec", "content": "", "creation_timestamp": "2026-02-02T12:27:49.321328Z"}, {"uuid": "9a20d9f5-b5ba-4fde-9f61-29047b86a854", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "exploited", "source": "https://t.me/habr_com_news/5159", "content": "\u200b\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Windows Print Spooler \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445\n\n\u041d\u0430 \u0441\u0430\u0439\u0442\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0421\u0428\u0410 (Cybersecurity and Infrastructure Security Agency, CISA) \u043f\u043e\u044f\u0432\u0438\u043b\u043e\u0441\u044c \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043e \u0442\u0440\u0435\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445. \u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 \u2014 CVE-2022-22718, \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u0441\u043b\u0443\u0436\u0431\u0435 \u043f\u0435\u0447\u0430\u0442\u0438 Windows Print Spooler.\n\n8 \u0444\u0435\u0432\u0440\u0430\u043b\u044f 2022 \u0433\u043e\u0434\u0430 Microsoft \u0432\u0440\u043e\u0434\u0435 \u043a\u0430\u043a \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0430\u0432, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0445\u043e\u0434\u0438\u043b\u0430 \u0431\u0440\u0435\u0448\u044c \u0432 Windows Print Spooler. \u041d\u043e, \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c CISA, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u043f\u0435\u0447\u0430\u0442\u0438 \u0432\u0441\u0451 \u0435\u0449\u0451 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u041e\u043d\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 7,8 \u0431\u0430\u043b\u043b\u0430 \u0438\u0437 10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS. \u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u043d\u0435 \u0441\u043a\u0430\u0447\u0430\u043b\u0438 \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0431\u044b\u043b\u0438 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u044b. \u0422\u0430\u043a\u0436\u0435, \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u043d\u0438\u043a\u043b\u0438 \u0434\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0435 \u0434\u0430\u0432\u0430\u043b\u0438 \u0441\u0435\u0431\u0435 \u0437\u043d\u0430\u0442\u044c, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\u043b\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c \u0438 \u0441\u0435\u0442\u044f\u043c. \u041d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0434\u0430\u044e\u0442 \u043f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u043a\u0443\u0434\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043b\u0438 \u0445\u0430\u043a\u0435\u0440\u044b, \u0430 \u043a\u0443\u0434\u0430 \u043d\u0435\u0442, \u0442\u043e\u043b\u044c\u043a\u043e \u0444\u0430\u043a\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c", "creation_timestamp": "2022-04-21T05:53:10.000000Z"}, {"uuid": "16435f58-010d-4757-9633-9c568c437522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-22718", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5380", "content": "#exploit\n1. CVE-2022-21241:\nCSV+ 0.8.0 - 2-Click Arbitrary Code Execution\nhttps://github.com/satoki/csv-plus_vulnerability\n\n2. CVE-2022-21999, CVE-2022-22718:\nSpoolFool - Windows Print Spooler Privilege Escalation\nhttps://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81\n]-&gt; The functional exploit and DLL:\nhttps://github.com/ly4k/SpoolFool", "creation_timestamp": "2024-10-11T22:00:31.000000Z"}]}