CVE-2022-30154: Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 5.3)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Jun
Released
2022-06-14
EPSS Score
2.88% (percentile: 86.3%)

FAQ

I am running a supported version of Windows Server. Is my system vulnerable to this issue? Systems running Windows Server that have the optional component File Server VSS Agent Service installed are vulnerable to this exploit. By default, systems running Windows Server are not vulnerable. In addition, Windows Client editions are not vulnerable to this exploit. Are there any more actions I need to take to be protected from this vulnerability? Yes. Customers who have the File Server VSS Agent Service running on their Windows Servers must install the June 14, 2022 or later Windows updates on both the Application Server and the File Server, to become protected and functional. Failure to install the updates on both machine roles could cause backup operations carried out by applications that previously worked to fail. For more information, see https://support.microsoft.com/help/5015527. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), major loss of integrity (I:H) but have no effect on availability (A:N). How could an attacker impact the File Server Shadow Copy Agent Service? An attacker who successfully exploited this vulnerability could affect the integrity of the shadow copy because they could create or delete a shadow copy file of SMB shares. Note, however, that an attacker cannot stop the RVSS service or access the content of the shadow copy. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.

Affected Products (11)

Windows

  • Windows Server 2019
  • Windows Server 2019 (Server Core installation)
  • Windows Server 2022
  • Windows Server 2022 (Server Core installation)
  • Windows Server, version 20H2 (Server Core Installation)
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)

ESU

  • Windows Server 2012
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2
  • Windows Server 2012 R2 (Server Core installation)

Security Updates (8)

Revision History

  • 2022-06-14: Information published.