9.8
CVSSv3

CVE-2022-26809

Published: 15/04/2022 Updated: 29/06/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 896
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Remote Procedure Call Runtime Remote Code Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows 7 -

microsoft windows rt 8.1 -

microsoft windows server 2008

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows 10 1909

microsoft windows 10 20h2

microsoft windows server 2016 20h2

microsoft windows 10 21h1

microsoft windows server 2022 -

microsoft windows 11 -

microsoft windows 10 21h2

Github Repositories

Cve-2022-26809 CVE-2022-26809 This repo just simply research for the CVE, for more detailed ananlysis,please refer here UPDATE:05/19 2022 This ananlyze hasn't been finished yet UPDATE:05/22 2022 HuanGMz Post and corelight blog show the real vulnerable point: OSF_CASSOCIATION::ProcessBindAckOrNak This vulnerability is triggered like CVE-2021-43893, when send the ESFRP

The poc for CVE-2022-26809 RCE via RPC will be updated here.

Microsoft-CVE-2022-26809-(aka The Little Boy) - POC The poc for CVE-2022-26809 RCE via RPC will be updated here We are in the process of identifying the vulnerable code and share the simplest one-click RCE here

CVE-2022-26809-RCE aHR0cHM6Ly9zYXRvc2hpZGlzay5jb20vcGF5L0NGRWgxbQ== aHR0cHM6Ly9zYXRvc2hpZGlzay5jb20vcGF5L0NGRWgxbQ== aHR0cHM6Ly9zYXRvc2hpZGlzay5jb20vcGF5L0NGRWgxbQ==

CVE-2022-26809-RCE

CVE-2022-26809-RCE CVE-2022-26809-RCE satoshidiskcom/pay/CFGspB

vuln scaner and exploit

CVE-2022-26809 vuln scaner and exploit Мы Hell Knights Crew решили вернуться на арену в связи с событиями происходящими мире В честь этого выставляем написанный нами эксплоит под SMB В комплекте присутствует чекер уязвимости и сам эк

The poc for CVE-2022-26809 RCE via RPC will be updated here.

Microsoft-CVE-2022-26809-(aka The Little Boy) - POC The poc for CVE-2022-26809 RCE via RPC will be updated here We are in the process of identifying the vulnerable code and share the simplest one-click RCE here

一款完全被动监听的谷歌插件,用于高危指纹识别、蜜罐特征告警和拦截、机器特征对抗

Heimdallr ⚡介绍 Heimdallr是一款致力于被动嗅探浏览器流量,用于提示漏洞框架指纹、告警拦截蜜罐请求、对抗浏览器特征追踪(浏览器持久化、webRTC、Canvas画布等)的Chrome插件。 🥑安装 GitHub Releases 下载插件最新编译版本 Chrome浏览器-扩展设置-开发者模式-加载已解压的扩展程序 注意

Remote Code Execution Exploit in the RPC Library

CVE description CVE-2022-26809 - weakness in a core Windows component (RPC) earned a CVSS score of 98 not without a reason, as the attack does not require authentication and can be executed remotely over a network, and can result in remote code execution (RCE) with the privileges of the RPC service, which depends on the process hosting the RPC runtime That critcal bug, with a

Cve-2022-26809 CVE-2022-26809 This repo just simply research for the CVE, for more detailed ananlysis,please refer here UPDATE:05/19 2022 This ananlyze hasn't been finished yet UPDATE:05/22 2022 HuanGMz Post and corelight blog show the real vulnerable point: OSF_CASSOCIATION::ProcessBindAckOrNak This vulnerability is triggered like CVE-2021-43893, when send the ESFRP

CVE-2022-26809-RCE-POC satoshidiskcom/pay/CFGstW

This repository contains a PoC for remote code execution CVE-2022-26809

CVE-2022-26809-RCE This repository contains a PoC for remote code execution CVE-2022-26809 This is a test does not work

Python

CVE-2022-26809 RCE RU: Уважаемые пользователи github, ресёрчеры а так же их родители Рад вам представить рабочее решение данного эксплойта Моя команда проделала большой путь и потратила очень много сил что бы найти RCE д

CVE-2022-26809 PoC

CVE-2022-26809

PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.

PoC-CVE-2022-26809 PoC for CVE-2022-26809, analisys and considerations are shown in the githubio The PoC has been writtin overriding Impacket functions Tested with: impacket version 0100 The PoC has not been fully tested, because it should trigger the vulnerability, ie integer overflow, that leads to a buffer overflow on the heap is reached after 1048576 packets sent, bec

Detects attempts and successful exploitation of CVE-2022-26809

CVE-2022-26809 Detects attempts and successful exploitation of CVE-2022-26809, a remote code execution vulnerability over DCE/RPC This package is described in detail in this Corelight blogpost This package generates the following notices: CVE_2022_26809::ExploitAttempt, and CVE_2022_26809::ExploitSuccess The first is generated when an attack is attempted, but does not neces

CVE-2022-26809 This repo just simply research for the CVE, for more detailed ananlysis,please refer here UPDATE:05/19 2022 This ananlyze hasn't been finished yet UPDATE:05/22 2022 HuanGMz Post and corelight blog show the real vulnerable point: OSF_CASSOCIATION::ProcessBindAckOrNak This vulnerability is triggered like CVE-2021-43893, when send the ESFRPC request to ls

ICIT Security Committee InfoSec News for Monthly Meetings

ICIT-SEC ICYMI All the news that's fit to hack What is this? This repo contains markdown (md) slides, made for use with hacker-slides, for the Iowa County Information Technology (ICIT) Security Committee (ICIT-SEC) monthly meetings Each month during the ICIT-SEC Zoom call, we discuss notable InfoSec (a/k/a cyber security for the cool crowd 😎) news since the last

cve-2022-26809 wwwpwndefendcom/2022/04/14/cve-2022-26809/ CVE-2022-26809 Vulnerability Information Rating Critical CVSS CVSS:31 98 Impact Remote Code Execution (RCE) Exploit in the wild Currently not observed Effort to Exploit (if PoC available) Low Network Position TCP/IP Routable or Network Adjacent Authentication Required to Exploit No Affected Windows Client/Ser

not an exploit or a poc

CVE-2022-26809 this is not an exploit or a poc For someone familiar with RPC using bindiff is enough to make an exploit Constructing a poc is not complicated And it is not complicated to construct the exploit from the poc CVE-2022-26809 has nothing to do with SMB, it's an RPC vuln where a variety of transports can be used, like TCP/135, SMB/445, etc so do the patch now!

《FanZhi-攻击与反制的艺术》

《FanZhi-攻击与反制的艺术》 本项目用来研究如何反制红队攻击队的方法和思路。攻与防的对抗一直可谓是道高一尺魔高一丈,但不知谁是道,不知谁是魔。蓝中包含着红,红中又包含着蓝。当然,只有优秀的攻击队才能出色的反制攻击队!希望利用本文能够让红队避免被干翻,更希望利

Recent Articles

IT threat evolution in Q2 2022. Non-mobile statistics
Securelist • AMR • 15 Aug 2022

IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2022: Kaspersky solutions blocked 1,164,544,060 attacks from online resources across the globe. Web Anti-Virus recognized 273,033,368 unique URLs as ma...

Microsoft's huge Patch Tuesday includes fix for bug under attack
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Get our weekly newsletter April bundle addresses 100-plus vulnerabilities including 10 critical RCEs

Microsoft's massive April Patch Tuesday includes one bug that has already been exploited in the wild and a second that has been publicly disclosed. In total, the Redmond giant patched a whopping 128 bugs today, including 10 critical remote code execution (RCE) vulnerabilities. First, though: CVE-2022-24521, which NSA and CrowdStrike security researchers reported to Microsoft, is under active exploitation. It's an elevation-of-privilege vulnerability, and it occurs in the Windows Common Log File ...