CVE-2022-26923 – Microsoft Active Directory Domain Services Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-26923
Active Directory Domain Services Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Active Directory Domain Services This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Microsoft Windows Active Directory Certificate Services. Authentication is required to exploit this vulnerability. The specific flaw exists within the issuance of certificates. By including crafted data in a certificate request, an attacker can obtain a certificate that allows the attacker to authenticate to a domain controller with a high level of privilege. An attacker can leverage this vulnerability to escalate privileges and disclose stored credentials, leading to further compromise. An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow for privilege escalation to SYSTEM. • https://github.com/lsecqt/CVE-2022-26923-Powershell-POC https://github.com/r1skkam/TryHackMe-CVE-2022-26923 https://github.com/Gh-Badr/CVE-2022-26923 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923 https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 https://cravaterouge.github.io/ad/privesc/2022/05/11/bloodyad-and-CVE-2022-26923.html • CWE-295: Improper Certificate Validation •
CVE-2022-24521 – Microsoft Windows CLFS Driver Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-24521
Windows Common Log File System Driver Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Common Log File System Driver. Este ID de CVE es diferente de CVE-2022-24481 Microsoft Windows Common Log File System (CLFS) Driver contains an unspecified vulnerability that allows for privilege escalation. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24521 •
CVE-2022-26904 – Microsoft Windows User Profile Service Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-26904
Windows User Profile Service Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows User Profile Service Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26904 https://github.com/rmusser01/SuperProfile https://web.archive.org/web/20220222105232/https://halove23.blogspot.com/2022/02/blog-post.html https://github.com/klinix5/ProfSvcLPE/blob/main/write-up.docx • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2022-22718 – Microsoft Windows Print Spooler Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-22718
Windows Print Spooler Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Print Spooler. Este ID de CVE es diferente de CVE-2022-21997, CVE-2022-21999, CVE-2022-22717 Microsoft Windows Print Spooler contains an unspecified vulnerability which allow for privilege escalation. • https://github.com/ahmetfurkans/CVE-2022-22718 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22718 •
CVE-2022-21971 – Microsoft Windows Runtime Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-21971
Windows Runtime Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota en Windows Runtime Microsoft Windows Runtime contains an unspecified vulnerability that allows for remote code execution. • https://github.com/0vercl0k/CVE-2022-21971 https://github.com/Malwareman007/CVE-2022-21971 https://github.com/tufanturhan/CVE-2022-21971-Windows-Runtime-RCE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21971 • CWE-824: Access of Uninitialized Pointer •