Skip to main content

CVE-2022-35762: Elevation of Privilege in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2022-35762cvecve-2022-35762
Published: Tue Aug 09 2022 (08/09/2022, 19:56:39 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Storage Spaces Direct Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 22:12:26 UTC

Technical Analysis

CVE-2022-35762 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically version 10.0.17763.0. The vulnerability resides in the Storage Spaces Direct component, a feature that enables the creation of highly available and scalable storage using local storage on multiple servers. The flaw allows an attacker with limited privileges (low-level privileges) to escalate their privileges to higher levels, potentially gaining full control over the affected system. The CVSS 3.1 base score is 7.8, indicating a high severity level. The attack vector is local (AV:L), meaning the attacker must have local access to the system, and the attack complexity is low (AC:L), so exploitation does not require specialized conditions. Privileges required are low (PR:L), and no user interaction is needed (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the system's data and operations. The vulnerability is categorized under CWE-269, which relates to improper privileges or permissions. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though Microsoft typically addresses such vulnerabilities through security updates. Given the nature of Storage Spaces Direct, this vulnerability could be exploited to gain administrative privileges on affected Windows 10 systems, potentially leading to unauthorized data access, system manipulation, or disruption of services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises relying on Windows 10 Version 1809 in their infrastructure, including data centers and storage solutions utilizing Storage Spaces Direct. Successful exploitation could lead to unauthorized administrative access, enabling attackers to exfiltrate sensitive data, disrupt business operations, or deploy further malware. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. The elevation of privilege could also facilitate lateral movement within networks, increasing the scope of compromise. Since the vulnerability requires local access, insider threats or compromised user accounts could be leveraged to exploit this flaw. The lack of known exploits in the wild reduces immediate risk but does not eliminate it, especially as threat actors may develop exploits over time. Organizations running legacy systems or delaying updates are at higher risk. Additionally, given the high impact on confidentiality, integrity, and availability, exploitation could lead to regulatory non-compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should prioritize upgrading or patching affected Windows 10 Version 1809 systems to the latest supported versions where this vulnerability is resolved. Since no direct patch links are provided, organizations should monitor Microsoft’s official security update channels and apply cumulative updates promptly. In the interim, restrict local access to critical systems using Storage Spaces Direct by enforcing strict access controls and monitoring for unusual privilege escalation attempts. Implement robust endpoint detection and response (EDR) solutions to detect suspicious activities indicative of privilege escalation. Employ the principle of least privilege across user accounts to minimize the risk of exploitation by low-privilege users. Regularly audit and harden system configurations related to Storage Spaces Direct and storage management. Additionally, conduct user awareness training to mitigate insider threats and ensure that only authorized personnel have physical or remote local access to sensitive systems. Network segmentation can also limit the spread of an attacker who gains elevated privileges. Finally, maintain comprehensive logging and monitoring to quickly identify and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-07-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838c00b182aa0cae28c8a3e

Added to database: 5/29/2025, 8:14:03 PM

Last enriched: 7/7/2025, 10:12:26 PM

Last updated: 7/28/2025, 10:50:19 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats