CVE-2022-26923
Active Directory Domain Services Elevation of Privilege Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- March 11, 2022
- Published Date
- May 10, 2022
- Last Updated
- February 04, 2025
- Vendor
- Microsoft
- Product
- Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 8.1, Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
- Description
- Active Directory Domain Services Elevation of Privilege Vulnerability
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
SSVC Information
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-08-18 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
Gh-Badr/CVE-2022-26923
Type: github • Created: 2023-11-28 16:13:36 UTC • Stars: 1
lsecqt/CVE-2022-26923-Powershell-POC
Type: github • Created: 2022-08-17 21:13:49 UTC • Stars: 17
LudovicPatho/CVE-2022-26923_AD-Certificate-Services
Type: github • Created: 2022-05-14 09:27:06 UTC • Stars: 44
r1skkam/TryHackMe-CVE-2022-26923
Type: github • Created: 2022-05-12 02:31:50 UTC • Stars: 6
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Proof of Concept Exploit Available