DECEMBER Vuln of the Month: CVE-2022-41128

Dec 13, 2022
Jerry Gamblin
Director of Security Research at Kenna Security

Share with Your Network

A serious Windows vulnerability is the star of December’s Vuln of the Month. This remote code execution (RCE) scripting vuln can do a lot of damage, and it’s already being exploited.  

CVE-2022-41128 is a critical scripting vulnerability present in a wide range of Windows versions, from Windows 7 to current Windows 11 releases. To steal or corrupt data—or possibly take control of systems—attackers will trick users into visiting malware-infected sites, whose code then takes advantage of the vulnerability.  

Our research shows that CVE-2022-41128 meets many of the criteria we look for in a vulnerability that could be exploited, including: 

  • Access complexity: Low 
  • Potential attack surface: Massive 
  • Exploitable remotely: Yes 
  • Authentication/privilege requirements: None 
  • Potential impact on availability: High 
  • Exploit code published: Yes 
  • Active exploits observed: Yes 
CVE-2022-41128 earns a Kenna Risk Score of 96.6
CVE-2022-41128 earns a Kenna Risk Score of 96.6

 

CVE-2022-41128 earns a Kenna Risk Score of 96.6, which means it represents a greater risk than 99.72% of all the CVEs we’ve scored to date. CVSS 3 also recognizes the risk and has assigned a base score of 8.8 (High). So at the risk of pummeling you with the point: CVE-2022-41128 is a high-risk vuln. 

Why CVE-2022-41128 matters 

Any Windows vulnerability warrants a close look, but a high-risk RCE that impacts several years’ worth of Windows releases is uniquely concerning. In this case, users can be phished into visiting a hacked or malicious site that exploits the vuln. Once the exploit is successful, attackers can engage in all kinds of mischief, with the potential of significant impacts on the availability of systems and services. Microsoft credits two researchers at Google for discovering and reporting the vuln. 

In response to this and other vulnerability disclosures, Cisco Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Secure Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. 

The rules included in this release that protect against the exploitation of many of these vulnerabilities are 60815-60816, 60818-60819, 60820-60821, 60822-60823, 60831-60832, 60833-60834. For Snort 3, the following rules are also available to protect against these vulnerabilities: 300309, 300310, 300311, 300312, 300315, 300316. 

Bottom line 

This vuln requires no authentication, can be exploited remotely, holds the potential for doing serious damage, represents a huge global attack surface, and is already being actively exploited. This one is worth fixing. 

Mitigation status 

On Nov. 8, Microsoft released 34 patches to cover all affected Windows versions. We recommend visiting Microsoft’s security guide to determine if your Windows version is listed and, if so, to download the fix. 

Watch this space for regular Vuln of the Month spotlights, which appear on the second Tuesday of each month. Meanwhile, if you find yourself chasing new and emerging vulns but never quite catching up, learn more about how Kenna Security can help you focus on your highest-risk vulnerabilities, rather than headlines, thanks in part to our vulnerability intelligence powered by machine learning.   

Read the Latest Content

Trending Vulns

November Vuln of the Month: CVE-2022-32893

November’s Vuln of the Month spotlights an Apple platform vulnerability—one that may pose risks to organizations with out-of-date iOS and MacOS versions.
READ MORE
Trending Vulns

October Vuln of the Month: CVE-2022-41040 and CVE-2022-41082

For October’s Vuln of the Month, we’ll feature two related CVEs, and explain why both are worth the attention of security teams. 
READ MORE
Trending Vulns

September Vuln of the Month: 2022 Round-Up Edition

September’s Vuln of the Month overviews the more interesting vulnerabilities from 2022.
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.