A critical* Windows Network File System (NFS) Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.8 was released by Microsoft.
This vulnerability is only exploitable for systems that have the NFS role enabled. An attacker could send a specially crafted NFS protocol network message to a vulnerable Windows machine, which could enable remote code execution. Even though no exploit regarding this vulnerability has been discovered yet, due to its severity/criticality, it is highly recommended that the recommended patches are downloaded to ensure the safety of systems/assets.
Affected Systems
IoC’s
-
Recommended Solution(s)
Organizations using the above-mentioned products are recommended to download the patches specified/recommended in the link below (under the “download” column).
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26937CVE / CWE
CVE-2022-26937
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.