Skip to main content

CVE-2022-35761: Elevation of Privilege in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2022-35761cvecve-2022-35761
Published: Tue Aug 09 2022 (08/09/2022, 19:56:23 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 22:12:10 UTC

Technical Analysis

CVE-2022-35761 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Windows kernel, which is a core component responsible for managing system resources and enforcing security boundaries. An elevation of privilege (EoP) vulnerability allows an attacker with limited access rights to gain higher privileges, potentially enabling them to execute arbitrary code with SYSTEM-level permissions or bypass security controls. This specific vulnerability is classified under CWE-269, which relates to improper privileges or permissions. The CVSS v3.1 base score is 7.8, indicating a high impact on confidentiality, integrity, and availability. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) shows that the attack requires local access (AV:L) with low attack complexity (AC:L), and the attacker must have some privileges (PR:L) but no user interaction is needed (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits in the wild have been reported, the vulnerability's nature makes it a significant risk, especially if combined with other vulnerabilities or used in targeted attacks. No official patches are linked in the provided data, but typically Microsoft addresses such vulnerabilities in security updates. The vulnerability was published on August 9, 2022, and was reserved on July 13, 2022. Given the affected version is Windows 10 1809, which is an older release, many organizations might have already migrated to newer versions, but legacy systems may still be vulnerable.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those still operating legacy Windows 10 Version 1809 systems. Successful exploitation could allow attackers to escalate privileges locally, leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and the potential deployment of malware or ransomware with elevated rights. Sectors such as finance, healthcare, government, and critical infrastructure are especially at risk due to the sensitive nature of their data and operations. The high impact on confidentiality, integrity, and availability means that exploitation could lead to data breaches, operational downtime, and significant financial and reputational damage. Additionally, the lack of user interaction requirement facilitates automated or stealthy attacks once local access is gained, increasing the threat level in environments where insider threats or lateral movement by attackers are concerns.

Mitigation Recommendations

1. Immediate patching: Although no patch links are provided, organizations should verify with Microsoft Update Catalog or Windows Update for any security updates addressing CVE-2022-35761 and apply them promptly. 2. Upgrade legacy systems: Migrate from Windows 10 Version 1809 to supported and updated Windows versions to reduce exposure to this and other vulnerabilities. 3. Restrict local access: Limit administrative and local user privileges strictly on endpoints and servers to reduce the risk of privilege escalation. 4. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities indicative of exploitation attempts. 5. Conduct regular vulnerability assessments and penetration testing focusing on privilege escalation vectors. 6. Employ network segmentation to contain potential breaches and limit lateral movement opportunities. 7. Educate IT staff and users about the risks of running outdated operating systems and the importance of applying security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-07-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838c00b182aa0cae28c8a3c

Added to database: 5/29/2025, 8:14:03 PM

Last enriched: 7/7/2025, 10:12:10 PM

Last updated: 8/7/2025, 12:43:28 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats