CVE-2022-26923
Active Directory Domain Services Elevation of Privilege Vulnerability
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- March 11, 2022
- Published Date
- May 10, 2022
- Last Updated
- February 04, 2025
- Vendor
- Microsoft
- Product
- Windows 10 Version 1809, Windows Server 2019, Windows Server 2019 (Server Core installation), Windows 10 Version 1909, Windows 10 Version 21H1, Windows Server 2022, Windows 10 Version 20H2, Windows Server version 20H2, Windows 11 version 21H2, Windows 10 Version 21H2, Windows 10 Version 1507, Windows 10 Version 1607, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows 8.1, Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
- Description
- Active Directory Domain Services Elevation of Privilege Vulnerability
CVSS Scores
CVSS v3.1
8.8 - HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
SSVC Information
- Exploitation
- active
- Technical Impact
- total
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-08-18 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
Gh-Badr/CVE-2022-26923
Type: github • Created: 2023-11-28 16:13:36 UTC • Stars: 1
A proof of concept exploiting CVE-2022-26923.
lsecqt/CVE-2022-26923-Powershell-POC
Type: github • Created: 2022-08-17 21:13:49 UTC • Stars: 17
A powershell poc to load and automatically run Certify and Rubeus from memory.
LudovicPatho/CVE-2022-26923_AD-Certificate-Services
Type: github • Created: 2022-05-14 09:27:06 UTC • Stars: 44
The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.
r1skkam/TryHackMe-CVE-2022-26923
Type: github • Created: 2022-05-12 02:31:50 UTC • Stars: 6
Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services