CVE-2022-21972: Windows Server VPN Remote Kernel Use After Free Vulnerability (Part 1) - Nettitude Labs
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Hardware - T1592.001 Server - T1583.004 Server - T1584.004 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | eb9deaef-9398-42e1-a9f0-ee8c4bc227fb |
Fingerprint | ff11b953f8249283 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 10, 2022, 9 a.m. |
Added to db | Jan. 18, 2023, 7:56 p.m. |
Last updated | Nov. 17, 2024, 6:50 p.m. |
Headline | CVE-2022-21972: Windows Server VPN Remote Kernel Use After Free Vulnerability (Part 1) |
Title | CVE-2022-21972: Windows Server VPN Remote Kernel Use After Free Vulnerability (Part 1) - Nettitude Labs |
Detected Hints/Tags/Attributes | 40/1/7 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 5 | cve-2022-21972 |
|
Details | Domain | 452 | msrc.microsoft.com |
|
Details | Domain | 281 | docs.microsoft.com |
|
Details | File | 3 | raspptp.sys |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | Url | 1 | https://msrc.microsoft.com/update-guide/vulnerability/cve-2022-21972 |
|
Details | Url | 1 | https://docs.microsoft.com/en-us/windows-hardware/drivers/network/winsock-kernel-overview |