CVE-2022-41120: Microsoft Windows System Monitor (Sysmon) Elevation of Privilege Vulnerability
Overview
- Severity
- High (CVSS 7.8)
- CVSS Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Elevation of Privilege
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2022-Nov
- Released
- 2022-11-08
- Last Updated
- 2022-12-22
- EPSS Score
- 0.93% (percentile: 76.1%)
FAQ
How could an attacker exploit this vulnerability?
A locally authenticated attacker could manipulate information on Windows System Monitor (Sysmon) to achieve elevation from local user to SYSTEM admin.
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
Detection & Weaponization (1 sources)
Maturity: Detection
- Sigma rules: Suspicious Sysmon as Execution Parent
Affected Products (1)
Developer Tools
Security Updates (1)
Acknowledgments
<a href="https://twitter.com/filip_dragovic">Filip Dragovic</a> with Infigo IS
Revision History
- 2022-11-08: Information published.
- 2022-12-22: Corrected the affected product name in the CVE title and in the FAQs. This is an informational change only.