CVE-2022-32230
Vulnerability from cvelistv5
Published
2022-06-14 21:40
Modified
2024-09-16 23:36
Severity ?
EPSS score ?
Summary
SMBv3 FileNormalizedNameInformation NULL Pointer Dereference
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:39:50.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Windows 10 Version 20H2", "vendor": "Microsoft", "versions": [ { "lessThan": "19042.1706", "status": "affected", "version": "19042.1706", "versionType": "custom" }, { "lessThan": "19043.1706", "status": "affected", "version": "19043.1706", "versionType": "custom" }, { "lessThan": "19043.1706", "status": "affected", "version": "19044.1706", "versionType": "custom" } ] }, { "product": "Windows Server Version 20H2", "vendor": "Microsoft", "versions": [ { "lessThan": "19042.1706", "status": "affected", "version": "19042.1706", "versionType": "custom" }, { "lessThan": "19043.1706", "status": "affected", "version": "19043.1706", "versionType": "custom" }, { "lessThan": "19044.1706", "status": "affected", "version": "19044.1706", "versionType": "custom" } ] }, { "product": "Windows 10 Version 21H1", "vendor": "Microsoft", "versions": [ { "lessThan": "19042.1706", "status": "affected", "version": "19042.1706", "versionType": "custom" }, { "lessThan": "19043.1706", "status": "affected", "version": "19043.1706", "versionType": "custom" }, { "lessThan": "19044.1706", "status": "affected", "version": "19044.1706", "versionType": "custom" } ] }, { "product": "Windows 10 Version 21H2", "vendor": "Microsoft", "versions": [ { "lessThan": "19042.1706", "status": "affected", "version": "19042.1706", "versionType": "custom" }, { "lessThan": "19043.1706", "status": "affected", "version": "19043.1706", "versionType": "custom" }, { "lessThan": "19044.1706", "status": "affected", "version": "19044.1706", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Spencer McIntyre of Rapid7" } ], "datePublic": "2022-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot." } ], "exploits": [ { "lang": "en", "value": "Metasploit module: https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-14T21:40:12", "orgId": "9974b330-7714-4307-a722-5648477acda7", "shortName": "rapid7" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504" } ], "solutions": [ { "lang": "en", "value": "This was fixed as a stability issue in the April, 2022 Patch Tuesday set from Microsoft." } ], "source": { "discovery": "EXTERNAL" }, "title": "SMBv3 FileNormalizedNameInformation NULL Pointer Dereference", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@rapid7.com", "DATE_PUBLIC": "2022-06-14T17:00:00.000Z", "ID": "CVE-2022-32230", "STATE": "PUBLIC", "TITLE": "SMBv3 FileNormalizedNameInformation NULL Pointer Dereference" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Windows 10 Version 20H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "19042.1706", "version_value": "19042.1706" }, { "version_affected": "\u003c", "version_name": "19043.1706", "version_value": "19043.1706" }, { "version_affected": "\u003c", "version_name": "19044.1706", "version_value": "19043.1706" } ] } }, { "product_name": "Windows Server Version 20H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "19042.1706", "version_value": "19042.1706" }, { "version_affected": "\u003c", "version_name": "19043.1706", "version_value": "19043.1706" }, { "version_affected": "\u003c", "version_name": "19044.1706", "version_value": "19044.1706" } ] } }, { "product_name": "Windows 10 Version 21H1", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "19042.1706", "version_value": "19042.1706" }, { "version_affected": "\u003c", "version_name": "19043.1706", "version_value": "19043.1706" }, { "version_affected": "\u003c", "version_name": "19044.1706", "version_value": "19044.1706" } ] } }, { "product_name": "Windows 10 Version 21H2", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "19042.1706", "version_value": "19042.1706" }, { "version_affected": "\u003c", "version_name": "19043.1706", "version_value": "19043.1706" }, { "version_affected": "\u003c", "version_name": "19044.1706", "version_value": "19044.1706" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "credit": [ { "lang": "eng", "value": "Spencer McIntyre of Rapid7" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot." } ] }, "exploit": [ { "lang": "en", "value": "Metasploit module: https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb" } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": "7.7", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/", "refsource": "MISC", "url": "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/" }, { "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230", "refsource": "CONFIRM", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230" }, { "name": "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb", "refsource": "MISC", "url": "https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb" }, { "name": "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504", "refsource": "MISC", "url": "https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504" } ] }, "solution": [ { "lang": "en", "value": "This was fixed as a stability issue in the April, 2022 Patch Tuesday set from Microsoft." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "9974b330-7714-4307-a722-5648477acda7", "assignerShortName": "rapid7", "cveId": "CVE-2022-32230", "datePublished": "2022-06-14T21:40:12.731452Z", "dateReserved": "2022-06-01T00:00:00", "dateUpdated": "2024-09-16T23:36:08.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-32230\",\"sourceIdentifier\":\"cve@rapid7.com\",\"published\":\"2022-06-14T22:15:10.450\",\"lastModified\":\"2022-06-23T19:28:34.777\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.\"},{\"lang\":\"es\",\"value\":\"Microsoft Windows SMBv3, sufre una desreferencia de puntero null en las versiones de Windows anteriores al conjunto de parches de abril de 2022. Al enviar una petici\u00f3n SMBv3 FileNormalizedNameInformation malformada a trav\u00e9s de una tuber\u00eda con nombre, un atacante puede causar un bloqueo de Pantalla Azul de la Muerte (BSOD) del kernel de Windows. Para la mayor\u00eda de los sistemas, este ataque requiere autenticaci\u00f3n, excepto en el caso especial de los controladores de dominio de Windows, donde los usuarios no autenticados siempre pueden abrir tuber\u00edas con nombre mientras puedan establecer una sesi\u00f3n SMB. Normalmente, tras el BSOD, el servidor SMBv3 v\u00edctima es reiniciado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"cve@rapid7.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"cve@rapid7.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2C378B-1507-4C81-82F6-9F599616845A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE4278F-71A7-43E9-8F79-1CBFAE71D730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E65CB9-6DC2-4A90-8C6A-103BEDC99823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8F3DD2-A145-4AF1-8545-CC42892DA3D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200AF17-0458-4315-A9D6-06C8DF67C05B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79EE26-FC32-417D-A49C-A1A63165A968\"}]}]}],\"references\":[{\"url\":\"https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/\",\"source\":\"cve@rapid7.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.