Vulnerability Name: CVE-2022-32230 (CCN-228471) Assigned: 2022-06-14 Published: 2022-06-14 Updated: 2022-06-23 Summary: Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-476 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2022-32230 Source: XF Type: UNKNOWNms-windows-cve202232230-dos(228471) Source: MISC Type: Exploit, Third Party Advisoryhttps://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb Source: CONFIRM Type: Patch, Vendor Advisoryhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230 Source: CCN Type: Microsoft Security TechCenter - June 2022Windows SMB Denial of Service Vulnerability Source: MISC Type: Patch, Vendor Advisoryhttps://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504 Source: MISC Type: Exploit, Third Party Advisoryhttps://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/ Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_10:1809:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_10:20h2:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_10:21h1:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_11:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_10:21h2:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_10:1809::~~~~x64~:*:*:*:*:* OR cpe:/o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* OR cpe:/o:microsoft:windows_10:1909:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:* OR cpe:/o:microsoft:windows_10:20h2:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_10_20h2:-:*:*:*:*:*:arm64:* OR cpe:/o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_10:21h1:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_10_21h1:-:*:*:*:*:*:arm64:* OR cpe:/o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_11_21h2:10.0.22000.739:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_11_21h2:10.0.22000.739:*:*:*:*:*:arm64:* OR cpe:/o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:* OR cpe:/o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:* Denotes that component is vulnerable BACK
microsoft windows server 2019 -
microsoft windows 10 1809
microsoft windows 10 20h2
microsoft windows 10 21h1
microsoft windows 11 -
microsoft windows 10 21h2
microsoft windows server 2019
microsoft windows 10 1809
microsoft windows 10 1809
microsoft windows 10 1909
microsoft windows 10 1909
microsoft windows 10 1909
microsoft windows 10 20h2
microsoft windows 10 20h2
microsoft windows 10 20h2
microsoft windows server 2019
microsoft windows 10 21h1
microsoft windows 10 21h1
microsoft windows 10 21h1
microsoft windows 11 -
microsoft windows 11 -
microsoft windows 10 21h2
microsoft windows 10 21h2