Initiatieven voor
Als nationale autoriteit voor cyberveiligheid heeft het CCB verschillende initiatieven ontwikkeld voor specifieke doelgroepen die hier worden gepresenteerd.
Reference:
Advisory #2023-05
Version:
1.0
Affected software:
Windows 10
Windows 7
Windows 8.1
Windows 8.1 RT
Windows Server 2008 R2
Windows Server 2012 (incl. server core installation)
Windows Server 2012 R2 (incl. server core installation)
Windows Server 2016 (incl. server core installation)
Windows Server 2019 (incl. server core installation)
Windows Server 2022 (incl. server core installation)
Type:
Pre-auth Remote Code Execution
CVE/CVSS:
CVE-2022-37958:CVSS 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37958
Successful exploitation of CVE-2022-37958 could give a remote unauthenticated attacker the capability to execute code on a vulnerable Windows system without requiring user interaction.
The attack has a high complexity, an attacker needs to perform this attack multiple times to be successful, but it requires no privileges or user interaction.
A successful attack has a high impact on all vertices of the CIA triad impacting Confidentiality, Integrity, and availability.
IBM noted that the vulnerability has the potential to be wormable. CVE-2017-0144 (EternalBlue) was an infamous wormable vulnerability responsible for the worldwide spread of WannaCry. If CVE-2022-37958 obtains the wormable capability, it is possibly more severe than the EternalBlue vulnerability, based on the fact that SPNEGO NEGOEX affects multiple protocols, while EternalBlue affects only SMBv1.
The vulnerability tracked as CVE-2022-37958 was originally disclosed as an information disclosure vulnerability with a CVSS score of 7.5. This vulnerability was patched with the updates from Microsoft Patch Tuesday, September 2022.
Research from IBM X-Force disclosed that CVE-2022-37958 could lead to pre-auth remote code execution. Microsoft acknowledged the assessment and re-evaluated the vulnerability as a critical pre-auth remote code execution vulnerability with a CVSS score of 8.1.
The Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) is an internet standard for negotiating which security mechanism to use when authentication between a client and server occurs. SPNEGO NEGOEX is an extended negotiation mechanism that enhances the older SPNEGO mechanism.
Microsoft’s Server Message Block (SMB) and Remote Desktop Protocol (RDP) use NEGOEX for authentication by default. Other protocols (e.g., HTTP) can also be configured to use NEGOEX.
CVE-2022-37958 does not require user authentication or interaction, and affects a wider range of protocols, IBM noted that the vulnerability has the potential to be wormable similar to CVE-2017-0144 (EternalBlue). EternalBlue was the vulnerability responsible for the worldwide spread of WannaCry.
To give Windows administrators a patch window to apply the patches, IBM will refrain from releasing the full technical details until Q2 2023.
The Centre for Cyber Security Belgium strongly recommends Windows system administrators to do the following:
Additional recommendations from IBM X-Force Red include:
https://www.tenable.com/blog/cve-2022-37958-faq-for-critical-microsoft-spnego-negoex-vulnerability
https://socradar.io/microsoft-reevaluates-spnego-negoex-vulnerability-cve-2022-37958-as-critical/