Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-34701: Denial of Service in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2022-34701cvecve-2022-34701
Published: Tue Aug 09 2022 (08/09/2022, 19:52:48 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 02:27:20 UTC

Technical Analysis

CVE-2022-34701 is a high-severity Denial of Service (DoS) vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Secure Socket Tunneling Protocol (SSTP) implementation. SSTP is a VPN tunneling protocol that encapsulates PPP traffic over HTTPS, commonly used to secure remote connections. The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, indicating that an attacker can exploit this flaw to cause excessive resource usage leading to service disruption. The CVSS 3.1 base score of 7.5 reflects a high impact primarily on availability, with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), making it remotely exploitable by unauthenticated attackers. Exploiting this vulnerability could allow attackers to send specially crafted SSTP packets that trigger resource exhaustion or crashes in the SSTP service, resulting in denial of service conditions that disrupt VPN connectivity or potentially affect other dependent services on the affected Windows 10 systems. The affected version is Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, and no known exploits are currently reported in the wild. No official patches are linked in the provided data, suggesting that mitigation might rely on workarounds or updates from Microsoft. Given the nature of SSTP as a VPN protocol, this vulnerability could impact organizations relying on SSTP-based VPNs for secure remote access, potentially disrupting remote workforce connectivity and business continuity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to availability, especially for enterprises and public sector entities that depend on Windows 10 Version 1809 systems for remote access via SSTP VPNs. Disruption of VPN services can lead to loss of remote connectivity, impacting productivity, access to critical applications, and secure communications. Sectors such as finance, healthcare, government, and critical infrastructure, which often enforce strict remote access controls, may experience operational interruptions. Additionally, denial of service conditions could be leveraged as part of multi-stage attacks or to create distractions during other malicious activities. Since the vulnerability does not affect confidentiality or integrity directly, data breaches are less likely; however, the loss of availability can have cascading effects on business operations and incident response capabilities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit code. Organizations still running Windows 10 Version 1809 should consider the risk elevated due to the lack of ongoing mainstream support for this version, potentially delaying patch availability and increasing exposure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading affected systems from Windows 10 Version 1809 to a more recent, supported Windows 10 or Windows 11 version where the vulnerability is patched or not present. If immediate upgrade is not feasible, organizations should consider disabling SSTP VPN services temporarily or restricting SSTP traffic at network perimeter devices such as firewalls and VPN gateways to trusted sources only. Implementing network-level filtering to block malformed SSTP packets or rate-limiting SSTP connections can reduce the risk of exploitation. Monitoring VPN server logs and network traffic for unusual SSTP activity or spikes in resource consumption can help detect attempted exploitation. Additionally, organizations should ensure that endpoint protection and intrusion detection systems are updated to recognize potential SSTP-based DoS attempts. Engaging with Microsoft support channels to obtain any available patches, hotfixes, or recommended workarounds is also advised. Finally, organizations should review their remote access architecture to consider alternative VPN protocols or multi-factor authentication mechanisms that may reduce reliance on SSTP.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-06-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6840c579182aa0cae2c16b32

Added to database: 6/4/2025, 10:15:21 PM

Last enriched: 7/7/2025, 2:27:20 AM

Last updated: 2/7/2026, 7:42:01 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats