Sunday, June 1, 2025
HomeCyber AttackCISA Asks Federal Agencies to Fix Win32k Privilege Escalation Flaw as Threat...

CISA Asks Federal Agencies to Fix Win32k Privilege Escalation Flaw as Threat Actors Actively Exploiting

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has recently commanded the Federal Agencies to immediately fix the Win32k privilege escalation flaw, as the threat actors are actively exploiting this security flaw.

For the threat actors, bugs like this are one of the most common lucrative attack vectors that cause major risk factors to all the Federal Civilian Executive Branch Agencies (FCEB).

The vulnerability has been tracked as CVE-2022-21882, and this is a Win32k Elevation of Privilege vulnerability that is actively exploited by the threat actors to target the Federal Civilian Executive Branch Agencies (FCEB) agencies.

- Advertisement - Google News

Here’s what the cybersecurity agency stated:-

“CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below.”

Flaw profile

  • CVEID: CVE-2022-21882
  • Description: Win32k Elevation of Privilege Vulnerability.
  • CWE ID: CWE-269
  • CWE Name: Improper Privilege Management
  • NVD Base Score: 7.8
  • Microsoft Corporation Base Score: 7.0
  • Severity: HIGH

While apart from this, the CISA (Cybersecurity and Infrastructure Security Agency) has also published the Required Action Due Date for FCEB networks:-

  • 18th February 2022 (18/02/2022)

Within this above-mentioned time frame, CISA has strongly recommended all the FCEB networks to patch their systems against this vulnerability that is under the active exploitation of threat actors.

Exploitation

The threat actors can use the newly obtained user rights that are obtained by exploiting the Win32k local privilege elevation vulnerability to perform the following key actions:-

  • Spread laterally within the network.
  • Create new admin users.
  • Execute privileged commands.

Moreover, due to critical bugs, several administrators have ignored the January 2022 updates, and here are the bugs found in the January 2022 updates:-

  • Unusual Reboots.
  • L2TP VPN problems.
  • Inaccessible ReFS volumes issues.
  • Hyper-V issues.

However, all the above-mentioned issues are fixed in the emergency out-of-band (OOB) updates that were already published on 17th January 2022. But, CISA has strongly recommended all the admins to immediately apply the updates and patches that are available to mitigate this flaw.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...