Security News > 2022 > May > Microsoft patches Windows LSA spoofing zero-day under active attack (CVE-2022-26925)

May 2022 Patch Tuesday is here, and Microsoft has marked it by releasing fixes for 74 CVE-numbered vulnerabilities, including one zero-day under active attack and two publicly known vulnerabilities.
First and foremost, we have CVE-2022-26925, an "Important" spoofing vulnerability in Windows Local Security Authority that may turn into a "Critical" one if combined with NTLM relay attacks.
"Being actively exploited in the wild, this allows an attacker to authenticate as approved users as part of an NTLM relay attack - letting threat actors gain access to the hashes of authentication protocols," noted Kevin Breen, Director of Cyber Threat Research at Immersive Labs.
The complexity of exploiting CVE-2022-26925 is considered high because exploitation requires an attacker to be positioned as an attacker-in-the-middle, added Satnam Narang, staff research engineer at Tenable, and joined Microsoft in urging administrators to patch this flaw, then follow it up with a review of two documents that delineate additional measures to mitigate NTLM relay attacks against Active Directory Certificate Services.
Dustin Childs, with Trend Micro's Zero Day Initiative, has singled out CVE-2022-26923, an EOP bug in Active Directory Domain Services, which may allow attackers to obtain a certificate that will allow them to authenticate to a domain controller with a high level of privilege - all they need is to include crafted data in a certificate request.
"In essence, any domain authenticated user can become a domain admin if Active Directory Certificate Services are running on the domain. This is a very common deployment. Considering the severity of this bug and the relative ease of exploit, it would not surprise me to see active attacks using this technique sooner rather than later," he noted.
News URL
https://www.helpnetsecurity.com/2022/05/10/cve-2022-26925/
Related news
- Microsoft fixes under-attack Windows zero-day Follina (source)
- Microsoft fixes new NTLM relay zero-day in all Windows versions (source)
- Microsoft closes Windows LSA hole under active attack (source)
- Microsoft fixes new PetitPotam Windows NTLM Relay attack vector (source)
- Microsoft shares mitigation for Windows KrbRelayUp LPE attacks (source)
- New Microsoft Office zero-day used in attacks to execute PowerShell (source)
- Zero-Day ‘Follina’ Bug Lays Microsoft Office Open to Attack (source)
- Microsoft shares mitigation for Office zero-day exploited in attacks (source)
- New Windows Search zero-day added to Microsoft protocol nightmare (source)
- Windows zero-day exploited in US local govt phishing attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-05-10 | CVE-2022-26925 | Authentication Bypass by Spoofing vulnerability in Microsoft products Windows LSA Spoofing Vulnerability. | 4.3 |
2022-05-10 | CVE-2022-26923 | Unspecified vulnerability in Microsoft products Active Directory Domain Services Elevation of Privilege Vulnerability. | 9.0 |