CERTFR-2022-ALE-003
Vulnerability from certfr_alerte
[mise à jour du 15 avril 2022]
Une vulnérabilité a été découverte dans l'implémentation Microsoft du protocole RPC - Remote Procedure Call - protocole permettant d'effectuer des appels de procédures sur des machines distantes. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance. En particulier, cette vulnérabilité affecte le protocole SMB - Server Message Block - qui permet notamment le partage de ressources comme les fichiers ou les imprimantes.
Le CERT-FR recommande d'appliquer la mise à jour dans les plus brefs délais, en priorité sur les systèmes les plus critiques (notamment les contrôleurs de domaine Active Directory). Au vu de la criticité de cette vulnérabilité, l'éditeur a publié des correctifs de sécurité pour des systèmes qui ne sont plus supportés (en particulier, Windows 7 et Windows Server 2008 R2).
Il est également requis de procéder à une revue des règles de filtrage afin de s'assurer du respect des bonnes pratiques de sécurisation des environnements Microsoft (notamment [1], [2], [3]).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
[mise à jour du 15 avril 2022]
Lorsque les correctifs ne peuvent pas être appliqués, il est préférable de procéder, par ordre de préférence :
- à la déconnexion des systèmes affectés du réseau ;
- au filtrage, sur les systèmes affectés, des ports réseaux suivants
en entrée :
- les ports TCP/139 et TCP/445 dans la mesure où SMB est un vecteur de transport de nombreuses interfaces RPC ;
- les ports UDP/135, TCP/135 ainsi que la plage de ports dynamique utilisés par l'écosystème RPC.
Vendor | Product | Description | ||
---|---|---|---|---|
Microsoft | Windows | Windows 11 for x64-based Systems | ||
Microsoft | Windows | Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Microsoft | Windows | Windows 11 for ARM64-based Systems | ||
Microsoft | Windows | Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Microsoft | Windows | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Microsoft | Windows | Windows Server, version 20H2 (Server Core Installation) | ||
Microsoft | Windows | Windows 7 for 32-bit Systems Service Pack 1 | ||
Microsoft | Windows | Windows 10 Version 1607 for x64-based Systems | ||
Microsoft | Windows | Windows 10 Version 21H2 for x64-based Systems | ||
Microsoft | Windows | Windows 8.1 for 32-bit systems | ||
Microsoft | Windows | Windows 10 Version 1909 for x64-based Systems | ||
Microsoft | Windows | Windows 10 for x64-based Systems | ||
Microsoft | Windows | Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Microsoft | Windows | Windows 10 Version 1909 for ARM64-based Systems | ||
Microsoft | Windows | Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Microsoft | Windows | Windows 10 Version 20H2 for ARM64-based Systems | ||
Microsoft | Windows | Windows 10 Version 1607 for 32-bit Systems | ||
Microsoft | Windows | Windows 10 Version 1809 for 32-bit Systems | ||
Microsoft | Windows | Windows 10 Version 1909 for 32-bit Systems | ||
Microsoft | Windows | Windows 8.1 for x64-based systems | ||
Microsoft | Windows | Windows Server 2012 | ||
Microsoft | Windows | Windows Server 2012 R2 | ||
Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
Microsoft | Windows | Windows RT 8.1 | ||
Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
Microsoft | Windows | Windows Server 2016 | ||
Microsoft | Windows | Windows 10 Version 21H2 for ARM64-based Systems | ||
Microsoft | Windows | Windows 10 Version 21H1 for 32-bit Systems | ||
Microsoft | Windows | Windows 10 Version 21H2 for 32-bit Systems | ||
Microsoft | Windows | Windows Server 2019 | ||
Microsoft | Windows | Windows 10 Version 1809 for ARM64-based Systems | ||
Microsoft | Windows | Windows 10 Version 20H2 for x64-based Systems | ||
Microsoft | Windows | Windows 7 for x64-based Systems Service Pack 1 | ||
Microsoft | Windows | Windows 10 Version 20H2 for 32-bit Systems | ||
Microsoft | Windows | Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Microsoft | Windows | Windows 10 for 32-bit Systems | ||
Microsoft | Windows | Windows 10 Version 1809 for x64-based Systems | ||
Microsoft | Windows | Windows 10 Version 21H1 for ARM64-based Systems | ||
Microsoft | Windows | Windows Server 2022 | ||
Microsoft | Windows | Windows 10 Version 21H1 for x64-based Systems |
Title | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Windows 11 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2008 R2 for x64-based Systems Service Pack 1", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 11 for ARM64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2008 for x64-based Systems Service Pack 2", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server, version 20H2 (Server Core Installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 7 for 32-bit Systems Service Pack 1", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1607 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 21H2 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 8.1 for 32-bit systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1909 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1909 for ARM64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 20H2 for ARM64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1607 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1809 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1909 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 8.1 for x64-based systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2012", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2012 R2", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2012 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2022 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2016 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows RT 8.1", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2019 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2012 R2 (Server Core installation)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2016", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 21H2 for ARM64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 21H1 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 21H2 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2019", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1809 for ARM64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 20H2 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 7 for x64-based Systems Service Pack 1", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 20H2 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2008 for 32-bit Systems Service Pack 2", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 for 32-bit Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 1809 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 21H1 for ARM64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows Server 2022", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Windows 10 Version 21H1 for x64-based Systems", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "closed_at": "2022-05-04", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n\u003cspan style=\"color: #ff0000;\"\u003e**\\[mise \u00e0 jour du 15 avril\n2022\\]**\u003c/span\u003e\n\nLorsque les correctifs ne peuvent pas \u00eatre appliqu\u00e9s, il est pr\u00e9f\u00e9rable\nde proc\u00e9der, par ordre de pr\u00e9f\u00e9rence :\n\n- \u00e0 la d\u00e9connexion des syst\u00e8mes affect\u00e9s du r\u00e9seau ;\n- au filtrage, sur les syst\u00e8mes affect\u00e9s, des ports r\u00e9seaux suivants\n en entr\u00e9e :\n - les ports TCP/139 et TCP/445 dans la mesure o\u00f9 *SMB* est un\n vecteur de transport de nombreuses interfaces *RPC* ;\n - les ports UDP/135, TCP/135 ainsi que la plage de ports dynamique\n utilis\u00e9s par l\u0027\u00e9cosyst\u00e8me *RPC.*\n", "cves": [ { "name": "CVE-2022-26809", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26809" } ], "initial_release_date": "2022-04-13T00:00:00", "last_revision_date": "2022-05-04T00:00:00", "links": [ { "title": "[1] Guide Microsoft sur la s\u00e9curisation du flux SMB", "url": "https://docs.microsoft.com/fr-fr/windows-server/storage/file-server/smb-secure-traffic" }, { "title": "[3] Recommandations sur le nomadisme num\u00e9rique", "url": "https://www.ssi.gouv.fr/guide/recommandations-sur-le-nomadisme-numerique/" }, { "title": "[2] Bulletin d\u0027actualit\u00e9 CERT-FR", "url": "https://www.cert.ssi.gouv.fr/actualite/CERTFR-2020-ACT-001/" } ], "reference": "CERTFR-2022-ALE-003", "revisions": [ { "description": "Version initiale", "revision_date": "2022-04-13T00:00:00.000000" }, { "description": "mise \u00e0 jour des recommandations", "revision_date": "2022-04-15T00:00:00.000000" }, { "description": "Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.", "revision_date": "2022-05-04T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "\u003cstrong\u003e\u003cspan style=\"color: #ff0000;\"\u003e\\[mise \u00e0 jour du 15 avril\n2022\\]\u003c/span\u003e\u003c/strong\u003e\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans l\u0027impl\u00e9mentation Microsoft du\nprotocole *RPC* - *Remote Procedure Call* -\u00a0 protocole permettant\nd\u0027effectuer des appels de proc\u00e9dures sur des machines distantes. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0\ndistance. En particulier, cette vuln\u00e9rabilit\u00e9 affecte le protocole\n*SMB* - *Server Message Block* - qui permet notamment le partage de\nressources comme les fichiers ou les imprimantes.\n\n\u003cstrong\u003eLe CERT-FR recommande d\u0027appliquer la mise \u00e0 jour dans les plus brefs\nd\u00e9lais,\u003c/strong\u003e en priorit\u00e9 sur les syst\u00e8mes les plus critiques (notamment les\ncontr\u00f4leurs de domaine *Active Directory*). Au vu de la criticit\u00e9 de\ncette vuln\u00e9rabilit\u00e9, l\u0027\u00e9diteur a publi\u00e9 des correctifs de s\u00e9curit\u00e9 pour\ndes syst\u00e8mes qui ne sont plus support\u00e9s (en particulier, Windows 7 et\nWindows Server 2008 R2).\n\n\u003cstrong\u003eIl est \u00e9galement requis de proc\u00e9der \u00e0 une revue des r\u00e8gles de filtrage\nafin de s\u0027assurer du respect des bonnes pratiques de s\u00e9curisation des\nenvironnements Microsoft (notamment \\[1\\], \\[2\\], \\[3\\]).\u003c/strong\u003e\n", "title": "[M\u00e0J] Vuln\u00e9rabilit\u00e9 dans l\u0027impl\u00e9mentation du protocole RPC par Microsoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 avril 2022", "url": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26809" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.