Skip to main content

CVE-2022-35764: Elevation of Privilege in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2022-35764cvecve-2022-35764
Published: Tue Aug 09 2022 (08/09/2022, 19:57:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Storage Spaces Direct Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 22:12:51 UTC

Technical Analysis

CVE-2022-35764 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically the Storage Spaces Direct component. Storage Spaces Direct is a feature that enables the creation of highly available and scalable software-defined storage using local storage. The vulnerability allows an attacker with limited privileges (low-level privileges) on a vulnerable system to escalate their privileges to higher levels, potentially SYSTEM level, without requiring user interaction. The CVSS 3.1 base score of 7.8 reflects the significant impact on confidentiality, integrity, and availability, with the attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The vulnerability is classified under CWE-269, which relates to improper privileges or permissions. Exploiting this flaw could allow an attacker to execute arbitrary code or commands with elevated privileges, thereby compromising the entire system. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for affected systems. The affected version is Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, but still in use in some environments, especially in enterprise and industrial settings where legacy systems persist. No official patch links are provided in the data, but Microsoft typically addresses such vulnerabilities through security updates.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those still operating Windows 10 Version 1809 in production environments. Successful exploitation could lead to full system compromise, allowing attackers to access sensitive data, disrupt operations, or deploy ransomware and other malware with elevated privileges. This is particularly critical for sectors such as finance, healthcare, manufacturing, and government, where data confidentiality and system availability are paramount. The local attack vector means that attackers need some form of access to the system, which could be achieved through phishing, insider threats, or exploiting other vulnerabilities to gain initial foothold. Once inside, the attacker could leverage this vulnerability to escalate privileges and move laterally within networks, increasing the scope of compromise. The lack of user interaction requirement further lowers the barrier for exploitation. Given the high impact on confidentiality, integrity, and availability, European organizations must prioritize mitigation to prevent potential breaches and operational disruptions.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should verify if Microsoft has released an official patch or security update for CVE-2022-35764 and apply it promptly. If no patch is available, consider upgrading to a newer, supported version of Windows 10 or Windows 11 where this vulnerability is not present. 2. Restrict local access: Limit local user accounts and enforce strict access controls to reduce the risk of attackers gaining the initial low-level access required to exploit this vulnerability. 3. Implement application whitelisting and endpoint protection: Use advanced endpoint detection and response (EDR) tools to monitor for suspicious privilege escalation attempts and block unauthorized code execution. 4. Network segmentation: Isolate critical systems and storage infrastructure to prevent lateral movement if an attacker gains initial access. 5. Monitor logs and alerts: Enable detailed auditing of privilege escalation events and Storage Spaces Direct operations to detect anomalous activities early. 6. User training and awareness: Educate users about phishing and social engineering attacks that could lead to initial access. 7. Disable or restrict Storage Spaces Direct if not in use: If the feature is not required, disabling it can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-07-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838b90d182aa0cae28b8c72

Added to database: 5/29/2025, 7:44:13 PM

Last enriched: 7/7/2025, 10:12:51 PM

Last updated: 8/8/2025, 2:35:04 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats