Microsoft Windows Sysinternals Sysmon < 14.13 Elevation of Privilege (November 2022)

high Nessus Plugin ID 168665

Synopsis

The Windows app installed on the remote host is affected by an elevation of privilege vulnerability.

Description

An elevation of privilege vulnerability exists in Microsoft Windows Sysinternals Sysmon prior to 14.13. A locally authenticated attacker who successfully exploited the vulnerability could manipulate information on the Sysinternals services to achieve elevation from local user to SYSTEM admin.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Sysinternals Sysmon version 14.13, or later.

See Also

http://www.nessus.org/u?2feb4fb7

Plugin Details

Severity: High

ID: 168665

File Name: smb_nt_ms22_nov_sysmon.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 12/13/2022

Updated: 1/19/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-41120

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/a:microsoft:sysinternals_sysmon

Required KB Items: installed_sw/Sysmon

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/28/2022

Vulnerability Publication Date: 11/8/2022

Exploitable With

Core Impact

Reference Information

CVE: CVE-2022-41120