Vulnerability Notice: CVE-2022-34721

Vendor:
Microsoft

Affected Product:
Windows 10 Version 1607 For 32-Bit Systems, Windows_10, Windows 10 Version 1607 For X64-Based Systems

CVSS SCORE:
9.8 of 10 (Critical)

Risk Index:
9.94 of 10 (Critical)

Description

A critical vulnerability has been identified in the Internet Key Exchange (IKE) Protocol Extensions of Windows operating systems. This vulnerability is a remote code execution (RCE) flaw allowing an attacker to send specially crafted packets to the server, potentially leading to full system compromise.

 

Affected Product(s)

  • Microsoft Windows 10 (all versions)

 

Technical Details

CVE-2022-34721 is a critical vulnerability in Windows Internet Key Exchange (IKE) Protocol Extensions. The vulnerability is rated as 9.8 out of 10 on the CVSS v3 scoring system, underscoring its severity. The IKE Protocol is traditionally used for establishing security associations (SAs) and cryptographic keys in an IPsec protocol suite. It includes mechanisms for peer authentication, SA negotiation, and key material exchange.

The vulnerability arises because of improper handling of IKE protocol extensions in Windows, specifically in the way that it processes certain overly large or malformed payloads. An unpatched Windows 10 system (all versions) is susceptible to this vulnerability.

An attacker can exploit this vulnerability by sending specially crafted IKE payloads to a target system. If the system processes these payloads, it can lead to memory corruption or buffer overflow, which affords the attacker the opportunity to execute arbitrary code. This vulnerability poses significant risks, including the potential for remote code execution.

Exploit code for this vulnerability has already been observed in the wild, significantly increasing the risk for any unpatched systems. Exploit demonstrations have typically involved payloads that exploit the target system’s handling of the IKE payloads to trigger a buffer overflow, subsequently allowing the execution of arbitrary commands with system privileges. This issue is primarily relevant for systems where IKE is actively used for IPsec VPNs or other secure communication protocols.

The vulnerability impacts a diverse range of users – from individual system administrators to enterprises running large networks with multiple Windows-based systems. For network operators and IT security professionals, mitigating this vulnerability requires immediate attention, given its potential for exploit and the severity of impact it can inflict on unprotected systems.

Threat actors such as ExCobalt have been associated with exploitation attempts around CVE-2022-34721. This group has formerly targeted similar vulnerabilities to breach systems and is known for its sophisticated operation techniques. The patches released by Microsoft in September 2022 address the critical vulnerability, urging system administrators to update their systems promptly.

Overall, the scope of this vulnerability requires users and administrators to remain vigilant and proactive in applying the recommended patches and implementing mitigations to prevent exploitation.

Weakness

Improper Control of Generation of Code (‘Code Injection’)

 

Impact Assessment

If exploited, the CVE-2022-34721 vulnerability could allow an attacker to gain complete control over an affected system. This includes unauthorized access to sensitive data, the ability to execute arbitrary code, and potentially deploying other malware or ransomware. The system under an attack can thus be rendered fully compromised, posing severe risks to the integrity, confidentiality, and availability of data within the affected environment.

 

Active Exploitation

We have observed activity from the adversary group ExCobalt, which is known for targeting similar vulnerabilities in the past. ExCobalt has been actively exploiting CVE-2022-34721, where exploitation can lead to memory corruption and remote code execution. The exploits manifest through crafted IKE extensions to trigger the vulnerability, resulting in full system compromise. Unauthorised access and control over critical systems raise the possibility of subsequent malicious activities including data exfiltration, persistent access, and deployment of ransomware.

 

Ransomware Association

The vulnerability has been linked to ransomware attacks, specifically the #BleedYou campaign. This campaign exploits CVE-2022-34721 to gain initial access to systems, often ending in ransomware deployment. This association emphasizes the importance of patching the vulnerability promptly to prevent falling victim to these heightened threats.

 

Mitigation and Resolution

We have released a patch that addresses this vulnerability. Please update to the latest version of Windows immediately to mitigate the risks associated with CVE-2022-34721.

 

Recommendations

  • We strongly recommend that all customers apply the latest patch as soon as possible.
  • Ensure that systems are updated to the latest security patch, KB5017305 for Windows 10.
  • If a temporary workaround is necessary, disabling the impacted functionality in the short term can reduce exposure until the patch is applied.
  • Regularly monitor the systems for unusual activities and apply any security advisory updates provided by Microsoft.
  • Follow best security practices such as regular backups and incident response readiness to improve overall security posture.

 

ย Referencesย 

 

View In Platform

Share This Post On