{"vulnerability": "CVE-2022-33679", "sightings": [{"uuid": "4f712a43-271e-446e-9534-76b15dd90d89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html", "content": "", "creation_timestamp": "2022-10-27T19:48:00.000000Z"}, {"uuid": "6d0e701f-8845-4f64-bcd1-d98636a76ec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3171", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1apoc of CVE-2022-33679\nURL\uff1ahttps://github.com/Blyth0He/CVE-2022-33679\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-03T10:08:17.000000Z"}, {"uuid": "c0ecee84-c13b-4f31-8bfd-c30be449acf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "seen", "source": "https://sploitus.com/exploit?id=6D4FBD5C-4B11-5450-8AE4-5EF22A7077D9&amp;amp;utm_source=rss&amp;amp;utm_medium=rss", "content": "", "creation_timestamp": "2025-09-28T16:32:14.000000Z"}, {"uuid": "82fdbaff-9473-4262-8c48-7da2ee901ed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3172", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1apoc of CVE-2022-33679\nURL\uff1ahttps://github.com/Amulab/CVE-2022-33679\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-11-03T11:28:03.000000Z"}, {"uuid": "a134c373-c22d-47a0-8b86-3a7b081b361b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "seen", "source": "https://t.me/avleonovrus/102", "content": "\u0414\u0430\u0432\u0430\u0439\u0442\u0435 \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u043c \u043d\u0430 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0439 Microsoft Patch Tuesday. \u0412 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043a\u043e\u043c\u043f\u0430\u043a\u0442\u043d\u0435\u043d\u044c\u043a\u043e. \u0412\u0441\u0435\u0433\u043e 63 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0421 \u0443\u0447\u0435\u0442\u043e\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0448\u0435\u0434\u0448\u0438\u0445 \u043c\u0435\u0436\u0434\u0443 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u0438\u043c \u0438 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u043c Patch Tuesday (\u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e, \u0432 Microsoft Edge), \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f 90. \u0412\u0435\u0441\u044c\u043c\u0430 \u0438 \u0432\u0435\u0441\u044c\u043c\u0430 \u043d\u0435\u043c\u043d\u043e\u0433\u043e.\n\n1. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442. \u0415\u0441\u0442\u044c 3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 Proof-of-Concept Exploit \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u0437 CVSS\n\nElevation of Privilege - Kerberos (CVE-2022-33679)\nElevation of Privilege - Azure Guest Configuration and Azure Arc-enabled servers (CVE-2022-38007)\nElevation of Privilege - Windows GDI (CVE-2022-34729)\n\n\u041d\u043e \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e \u0434\u043e\u043a\u0440\u0443\u0442\u044f\u0442 \u0434\u043e \u0431\u043e\u0435\u0432\u043e\u0433\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f \u043d\u0435\u0432\u044b\u0441\u043e\u043a\u0430.\n\n2. \u0415\u0441\u0442\u044c 3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432\u0436\u0438\u0432\u0443\u044e\n\nElevation of Privilege - Windows Common Log File System Driver (CVE-2022-37969). \u041c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0434\u043e SYSTEM. \u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043c\u0430\u0441\u0441\u0443 \u0432\u0435\u0440\u0441\u0438\u0439 Windows, \u0435\u0441\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0434\u0430\u0436\u0435 \u043f\u043e\u0434 EOL \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043a\u0438. \u041a\u0440\u043e\u043c\u0435 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u043f\u0443\u0447\u043e\u043a \u0432\u0438\u043d\u0434\u043e\u0432\u044b\u0445 EoP-\u0448\u0435\u043a \u0431\u0435\u0437 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 Elevation of Privilege - Windows Kernel (CVE-2022-37956, CVE-2022-37957, CVE-2022-37964)\n\nSecurity Feature Bypass - Microsoft Edge (CVE-2022-2856, CVE-2022-3075). \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Edge \u044d\u0442\u043e \u043f\u043e \u0444\u0430\u043a\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Chromium. \u041e\u0431\u0440\u0430\u0442\u043d\u0430\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0434\u043d\u043e\u0433\u043e \u0438 \u0442\u043e\u0433\u043e \u0436\u0435 \u0434\u0432\u0438\u0436\u043a\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Chrome \u0430\u0444\u0444\u0435\u043a\u0442\u044f\u0442 \u0442\u0430\u043a\u0436\u0435 Edge, Opera, Brave, Vivaldi \u0438 \u043f\u0440\u043e\u0447\u0435\u0435.\n\n3. RCE \u043e\u0442 \u043f\u043e\u0441\u043b\u0430\u043d\u043d\u043e\u0433\u043e IP \u043f\u0430\u043a\u0435\u0442\u0430 \ud83d\ude31\n\nRemote Code Execution - Windows TCP/IP (CVE-2022-34718). \"An unauthorized attacker can use it to execute arbitrary code on the attacked Windows computer with the IPSec service enabled by sending a specially crafted IPv6 packet to it. This vulnerability can only be exploited against systems with Internet Protocol Security (IPsec) enabled.\" IPsec \u0438 IPv6 \u0437\u043b\u043e, \u043b\u043e\u043b. \ud83d\ude42 \u041d\u043e \u0435\u0441\u043b\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e, \u0442\u043e \u0441\u043a\u0432\u0435\u0440\u043d\u043e, \u0447\u0442\u043e \u0442\u0430\u043a\u043e\u0435 \u0432\u043e\u043e\u0431\u0449\u0435 \u0431\u044b\u0432\u0430\u0435\u0442.\n\n\u0418 \u044d\u0442\u043e \u0435\u0449\u0451 \u043d\u0435 \u0432\u0441\u0435, \u0435\u0441\u0442\u044c \u0435\u0449\u0451 Remote Code Execution - Windows Internet Key Exchange (IKE) Protocol Extensions (CVE-2022-34721, CVE-2022-34722). \"An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.\"\n\n4. Denial of Service - Windows DNS Server (CVE-2022-34724). \u0421 \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e DoS, \u0441 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0440\u0430\u0431\u043e\u0442\u0443 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u043d\u0435\u043f\u043b\u043e\u0445\u043e \u0442\u0430\u043a \u043f\u0430\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c.\n\n5. Memory Corruption - ARM processor (CVE-2022-23960). \u0424\u0438\u043a\u0441 \u0434\u043b\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0433\u043e Spectre, \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 Spectre-BHB. \u041f\u0440\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0431\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0432\u0438\u0434\u0438\u043c\u043e \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u044c \u043d\u0435 \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f, \u0442\u0430\u043a \u0436\u0435 \u043a\u0430\u043a \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0442\u0438\u043f\u0430 Spectre, \u043d\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0441\u0435 \u043e\u0431\u0437\u043e\u0440\u0449\u0438\u043a\u0438 \u043d\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043e\u0431\u0440\u0430\u0442\u0438\u043b\u0438.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 Vulristics: https://avleonov.com/vulristics_reports/ms_patch_tuesday_september2022_report_with_comments_ext_img.html\n\n@avleonovrus #Microsoft #PatchTuesday #Vulristics", "creation_timestamp": "2023-09-21T09:16:46.000000Z"}, {"uuid": "f3452bb8-589c-4198-889d-25b675e2091c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1341", "content": "\u200b\u200bCVE-2022-33679\n\nJust released a tool to exploit CVE-2022-33679\n\nhttps://github.com/Bdenneu/CVE-2022-33679\n\nDetails:\nhttps://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html\n\n#cve #exploit", "creation_timestamp": "2022-11-04T09:30:02.000000Z"}, {"uuid": "e33a2071-be5d-44ac-85e1-d5bb4d7b9ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "Telegram/CnoGumdo9uZPOMjTcsoQghWees1fUQ7oCvxjyWCBmnqCir4", "content": "", "creation_timestamp": "2025-09-28T23:00:11.000000Z"}, {"uuid": "0296d77a-770a-4b8e-9e93-334008105cc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/poxek/2545", "content": "#cve202233679\n\n\u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 Kerberos \u0438 \u0447\u0442\u043e \u0437\u0430 CVE-2022-33679? \n\n\u0420\u0435\u0448\u0438\u043b \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0441 Kerberos, \u0430 \u0442\u0443\u0442 \u0435\u0449\u0435 \u043d\u043e\u0432\u0430\u044f \u0432\u0443\u043b\u043d\u0430 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0441 \u043d\u0435\u0439.\n\u0414\u0430\u043d\u043d\u0430\u044f \u0432\u0443\u043b\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043a\u0430\u043a \u0434\u0440\u0443\u0433\u043e\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u041d\u041e \u0435\u0441\u043b\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u044b\u043b \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d \u043d\u0430 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0439 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \n\n\u0427\u0438\u0442\u0430\u0442\u044c \u0442\u0443\u0442...\n\n\u0415\u0441\u043b\u0438 \u043a\u043e\u0433\u043e-\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0443\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e CVE, \u0442\u043e \u0432\u0441\u0435 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u044b \u0432\u044b \u043d\u0430\u0439\u0434\u0435\u0442\u0435 \u0437\u0434\u0435\u0441\u044c:\n\n\ud83d\udd18https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html\n\ud83d\udd18https://github.com/Bdenneu/CVE-2022-33679", "creation_timestamp": "2022-11-04T20:39:04.000000Z"}, {"uuid": "36b00a6c-e330-49c7-bc4c-c2a82f2124ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "Telegram/YEiFamPdgcqsNBKcTHrz6s6bZPTIwshB08cHvtzul5ZyUxA", "content": "", "creation_timestamp": "2025-06-30T21:00:03.000000Z"}, {"uuid": "f4465463-16a8-40d1-9520-fcfa9d723e1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/monkey_hacker/26", "content": "#cve202233679\n\n\u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 Kerberos \u0438 \u0447\u0442\u043e \u0437\u0430 CVE-2022-33679? \n\n\u0420\u0435\u0448\u0438\u043b \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0441 Kerberos, \u0430 \u0442\u0443\u0442 \u0435\u0449\u0435 \u043d\u043e\u0432\u0430\u044f \u0432\u0443\u043b\u043d\u0430 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0441 \u043d\u0435\u0439.\n\u0414\u0430\u043d\u043d\u0430\u044f \u0432\u0443\u043b\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043a\u0430\u043a \u0434\u0440\u0443\u0433\u043e\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u041d\u041e \u0435\u0441\u043b\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u044b\u043b \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d \u043d\u0430 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0439 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \n\n\u0427\u0438\u0442\u0430\u0442\u044c \u0442\u0443\u0442...\n\n\u0415\u0441\u043b\u0438 \u043a\u043e\u0433\u043e-\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0443\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e CVE, \u0442\u043e \u0432\u0441\u0435 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u044b \u0432\u044b \u043d\u0430\u0439\u0434\u0435\u0442\u0435 \u0437\u0434\u0435\u0441\u044c:\n\n\ud83d\udd18https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html\n\ud83d\udd18https://github.com/Bdenneu/CVE-2022-33679", "creation_timestamp": "2022-11-11T07:59:11.000000Z"}, {"uuid": "549f2fe6-660c-4bd2-ba40-9d4087d99f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "Telegram/v_2CwLdwouF2yh_UJcUQ1l4c6U_w9aWQ_FfYAvyYxFmdBFE", "content": "", "creation_timestamp": "2025-06-30T09:00:04.000000Z"}, {"uuid": "6cfb00d0-6369-46f8-a782-cdc3f3a1bb4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "seen", "source": "https://t.me/ctinow/95645", "content": "From CVE-2022-33679 to Unauthenticated Kerberoasting\n\nhttps://ift.tt/PYpTw5r", "creation_timestamp": "2023-02-26T01:02:00.000000Z"}, {"uuid": "6607685a-e134-46ee-a6f2-85bc345c6758", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "Telegram/a5WabAF0bW_znuZzt21-vJO8lujXFNjJSz0VuHn3ojJqyrQ", "content": "", "creation_timestamp": "2022-11-14T13:10:15.000000Z"}, {"uuid": "aafe142f-64ae-410d-935f-302b7b27b111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "Telegram/Wdawp5npqpum2gr-HgnqKnv2Zchf5BG_oI-h5l_4CRR8Hgc", "content": "", "creation_timestamp": "2022-11-13T05:07:03.000000Z"}, {"uuid": "6e34e8ff-5f62-414f-925e-68114b643f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/189", "content": "Top Security News for 26/10/2022\n\nHow businesses are gaining integrated data protection with Microsoft Purview\nhttps://www.microsoft.com/en-us/security/blog/2022/10/25/how-businesses-are-gaining-integrated-data-protection-with-microsoft-purview/ \n\nCISA Seeks Feedback on Baseline Measures to Secure Cloud Configuration\nhttps://malware.news/t/cisa-seeks-feedback-on-baseline-measures-to-secure-cloud-configuration/64496#post_1 \n\nIndictments in PRC espionage cases. LogCrusher and OverLog. Update on the hybrid war. Two cyber trend studies.\nhttps://thecyberwire.com/newsletters/daily-briefing/11/205 \n\nHow the Software Supply Chain Security is Threatened by Hackers\nhttps://thehackernews.com/2022/10/how-software-supply-chain-security-is.html \n\nThe Logging Dead: Two Event Log Vulnerabilities Haunting Windows\nhttps://www.reddit.com/r/netsec/comments/yd1pdw/the_logging_dead_two_event_log_vulnerabilities/ \n\nMicropatches for Kerberos Elevation of Privilege (CVE-2022-33647, CVE-2022-33679)\nhttps://malware.news/t/micropatches-for-kerberos-elevation-of-privilege-cve-2022-33647-cve-2022-33679/64498#post_1 \n\nIoT security strategy from enterprises using connected devices\nhttps://www.networkworld.com/article/3677470/iot-security-strategy-from-those-who-use-connected-devices.html#tk.rss_all \n\nPayment Terminal Malware Steals $3.3m Worth Of Credit Card Numbers\nhttps://packetstormsecurity.com/news/view/33971/Payment-Terminal-Malware-Steals-3.3m-Worth-Of-Credit-Card-Numbers.html \n\n\u201cBaseball &amp; Espionage\u201d \u2013with World Series Champion Ryan Zimmerman &amp; Marc Polymeropoulous\nhttps://thecyberwire.com/podcasts/spycast/561/notes \n\nThe Secrets Behind Uber's Breach\nhttps://www.reddit.com/r/netsec/comments/ydebot/the_secrets_behind_ubers_breach/ \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2022-10-26T07:00:06.000000Z"}, {"uuid": "207dbcc6-01db-4a3c-bf7a-ce9f0ece723e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "seen", "source": "https://t.me/ctinow/72417", "content": "Technical Analysis of CVE-2022-33679 and CVE-2022-33647 Kerberos Vulnerabilities\n\nhttps://ift.tt/tiLPU5j", "creation_timestamp": "2022-10-31T19:01:56.000000Z"}, {"uuid": "72918a00-ca17-4fb0-b52c-ce5addbaa98a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/579", "content": "\u200b\u200bCVE-2022-33679\n\nJust released a tool to exploit CVE-2022-33679\n\nhttps://github.com/Bdenneu/CVE-2022-33679\n\nDetails:\nhttps://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html", "creation_timestamp": "2022-11-28T19:10:36.000000Z"}, {"uuid": "cebb9912-2c98-4b04-b52f-242ea91f4537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1137", "content": "\u0412\u0440\u0435\u0434\u043d\u044b\u0439 RC4 \u0438 1day exploit\nCVE-2022-33679\n\u041a\u0430\u043a \u044d\u0442\u043e \u0431\u044b\u043b\u043e - \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0442\u0443\u0442\n\u0417\u0430\u0431\u0440\u0430\u0442\u044c exploit \u0442\u0443\u0442\n\n#windows #exploit #kerberos", "creation_timestamp": "2022-11-04T08:09:58.000000Z"}, {"uuid": "44f6abb2-4fea-4e5e-898e-365687382409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/135719", "content": "{\n  \"Source\": \"https://t.me/documentors\",\n  \"Content\": \"CVE-2022-33679.zip 1.2 MB \ud83d\udd25\ud83d\udd25\ud83d\udd25CVE-2022-33679(Windows Kerberos Elevation of Privilege) -&gt; PoC exploit usage: CVE-2022-33079.py [-h] [-ts] [-debug] [-dc-ip ip address] target serverName\", \n  \"author\": \"\u2693\ufe0f\ud835\udd07\ud835\udd2c\ud835\udd20\ud835\udd32\ud835\udd2a\ud835\udd22\ud835\udd2b\ud835\udd31\ud835\udd2c\ud835\udd2f\",\n  \"Detection Date\": \"04 Nov 2022\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 Data Leak monitoring system\ud83d\udd39", "creation_timestamp": "2022-11-04T11:56:36.000000Z"}, {"uuid": "24e26188-1655-4fc4-a4bb-e1d8d930b9b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "Telegram/p1Fd2jlBaRay8d_uyozscOmEwY7a1_eeKZR0EjL-6FCFZNA", "content": "", "creation_timestamp": "2022-12-25T14:42:48.000000Z"}, {"uuid": "f9e2d62a-9339-4677-bd38-e621c09da267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1280", "content": "CVE-2022-33679 Windows Kerberos Elevation of Privilege\n\nhttps://github.com/Bdenneu/CVE-2022-33679\n\n#git #exploit", "creation_timestamp": "2022-11-03T15:12:41.000000Z"}, {"uuid": "d096b5a5-d167-417e-86d3-ea9ac9ccd083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7098", "content": "#exploit\n1. CVE-2022-33679:\nWindows Kerberos EoP Vulnerability\nhttps://github.com/Bdenneu/CVE-2022-33679\n\n2. CVE-2022-26743:\nA tale of a simple Apple XNU kernel bug\nhttps://pwning.systems/posts/easy-apple-kernel-bug", "creation_timestamp": "2022-11-04T14:18:10.000000Z"}, {"uuid": "d3a49dda-b077-4e4b-b1d8-9b8ffe3aacf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-33679", "type": "exploited", "source": "https://t.me/LearnExploit/4299", "content": "CVE-2022-33679 ( Harmful RC4 and 1day exploit )\n\nExploit\n\nREAD\n\n#windows #exploit \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-11-12T16:32:01.000000Z"}]}