Microsoft Windows Network File System Remote Code Execution Vulnerability

Microsoft Windows Network File System Remote Code Execution Vulnerability

A critical* Windows Network File System (NFS) Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.8 was released by Microsoft.

Microsoft Windows Network File System Remote Code Execution Vulnerability

This vulnerability is only exploitable for systems that have the NFS role enabled. An attacker could send a specially crafted NFS protocol network message to a vulnerable Windows machine, which could enable remote code execution. Even though no exploit regarding this vulnerability has been discovered yet, due to its severity/criticality, it is highly recommended that the recommended patches are downloaded to ensure the safety of systems/assets.

Affected Systems

  • Windows Server 2012 R2 (Server Core installation)
  • Windows Server 2012 R2
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012
  • Windows RT 8.1
  • Windows 8.1 for x64-based systems
  • Windows 8.1 for 32-bit systems
  • Windows Server 2016 (Server Core installation)
  • Windows Server 2016
  • Windows 10 Version 1607 for x64-based Systems
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 for x64-based Systems
  • Windows 10 for 32-bit Systems
  • Windows 10 Version 21H2 for x64-based Systems
  • Windows 10 Version 21H2 for ARM64-based Systems
  • Windows 10 Version 21H2 for 32-bit Systems
  • Windows 11 for ARM64-based Systems
  • Windows 11 for x64-based Systems
  • Windows Server, version 20H2 (Server Core Installation)
  • Windows 10 Version 20H2 for ARM64-based Systems
  • Windows 10 Version 20H2 for 32-bit Systems
  • Windows 10 Version 20H2 for x64-based Systems
  • Windows Server 2022 (Server Core installation)
  • Windows Server 2022
  • Windows 10 Version 21H1 for 32-bit Systems
  • Windows 10 Version 21H1 for ARM64-based Systems
  • Windows 10 Version 21H1 for x64-based Systems
  • Windows 10 Version 1909 for ARM64-based Systems
  • Windows 10 Version 1909 for x64-based Systems

IoC’s

-

Recommended Solution(s)

Organizations using the above-mentioned products are recommended to download the patches specified/recommended in the link below (under the “download” column).

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24497

CVE / CWE

CVE-2022-24497

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.