This Nasty Windows Security Exploit Gives Hackers Control Of Your PC, Patch ASAP

CVE 2022 21882 news 2
A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures (CVE) system with the name CVE-2022-21882. The National Institute of Standards and Technology (NIST) has given the vulnerability a high severity rating of 7.8.

The vulnerability functions as a bypass for CVE-2021-1732, a vulnerability found in December of 2020 to have been actively exploited since May of that year. Microsoft patched this prior elevation of privilege vulnerability in 2021, but this new one gets around the old patch, requiring a new patch.

Microsoft accordingly released a patch for the new vulnerability as part of January 2022’s Patch Tuesday update, which included fixes for 96 other vulnerabilities as well. The vulnerability affects all versions of Windows 10 and 11, as well as Windows Server 2019 and 2022, without the patch. However, security researchers have currently found full exploits of the vulnerability only for Windows 10 and Windows Server 2019.

Patching this update is particularly critical for Windows Server admins who may have decided to skip January’s 2022 Patch Tuesday update or even rolled back to the previous version after initially installing the update on account of some significant bugs that initially accompanied it. As we reported earlier this month, the update shipped with bugs that were causing Windows domain controllers to boot loop, blocking Hyper-V initialization, disabling ReFS support, and breaking certain types of IPSEC connections. Fortunately, Microsoft has issued updates for these bugs, so Windows Server admins should install January’s update in order to receive the patch for this latest elevation of privilege vulnerability.

CVE 2022 21882 exploit news

Shortly after the vulnerability went public, multiple exploits for it were publicly released and confirmed to work. The exploits enable attackers with limited access to Windows devices to elevate their privileges, create new administrative users, and perform privileged commands.

You can read more about the vulnerability on Microsoft’s public notice of disclosure or RyeLy’s breakdown.
NW

Nathan Wasson

Nathan grew up with computer hardware news and reviews in the family business and eventually joined the business himself in 2014. He initially joined to make video reviews and help with the podcast, but was soon asked if he would write, and he's been writing about computers ever since. More recently, Nathan has developed a passion for internet privacy, security, and decentralization and likes writing about those topics the most. He spends much of his free time tinkering with Linux distributions, custom Android ROMs, privacy and security tools, and self-hosting solutions. He also started gaming on a PC at a young age and still can't give up Unreal Tournament 2004 and Supreme Commander 2. Beyond computers, Nathan is a car enthusiast and philosophy nerd.

You can follow Nathan on Mastodon and Twitter.

Opinions and content posted by HotHardware contributors are their own.