TLP Rating: Clear
Microsoft windows client Server Runtime (CSRSS) Privilege Escalation – CVE-2022-22047
CERT Vanuatu (CERTVU) and the Office of the Chief Information Officer (OGCIO) provides the following advisory.
On the 12th of July 2022, CERT Vanuatu has received an advisory from its collaborating partner, Cybersecurity Infrastructure Security Agency (CISA) of the alert for the threat.
CERTVU would like to advise its constituents using Microsoft Products to swiftly act on addressing this threat.
What is it?
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Microsoft Windows Client/Server Runtime Subsystem (CSRSS). A local user can run a specific crafted program to execute arbitrary code with SYSTEM privileges.
Identification of Vulnerable Devices
CVE-2022-22047 impacts Microsoft products both server and client Windows platforms, including the latest windows 11 and Windows Server 2022 releases.
Mitigation Process / How do I Stay Safe?
Install latest updates from Microsoft Windows website for your products
References
- Download advisory (English): Microsoft windows client Server Runtime (CSRSS) Privilege Escalation – CVE-2022-22047
- Telecharger avis (French): Escalade de privilèges dans le sous-système Windows Client Server Runtime (CSRSS)
- Download (Bislama): Privilij Eskelesen blong Client Server Runtime (CSRSS) long Microsoft windows – CVE-2022-22047