Published: 09/11/2022 Updated: 16/11/2022
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8

Vulnerability Summary

Microsoft Windows Sysmon Elevation of Privilege Vulnerability.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows sysmon -

Github Repositories

SysmonEoP Proof of Concept for arbitrary file delete/write in Sysmon (CVE-2022-41120/CVE-2022-XXXXX) Vulnerability Vulnerability is in code responsible for ClipboardChange event that can be reached through RPC Local users can send data to RPC server which will then be written in C:\Sysmon directory (default ArchiveDirectory) and deleted afterwards In version before 1411 Sysm

CVE-2022-41120 Microsoft Windows Sysmon Elevation of Privilege Vulnerability authentication complexity vector not available not available not available confidentiality integrity availability not available not available not available CVSS Score: not available References portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2022-41120 Brut

Sysinternals Archive This repository performs automated archiving of the Sysinternals utilities as only the latest version can be obtained from official sources Tool versions are tagged accordingly This repository is neither owned, maintained nor endorsed by Microsoft, Mark Russinovich or Sysinternals All utilities, assets, logos and rights belong to their respective owners