CVE-2022-35766: Remote Code Execution in Microsoft Windows 10 Version 1809
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
AI Analysis
Technical Summary
CVE-2022-35766 is a high-severity remote code execution (RCE) vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Secure Socket Tunneling Protocol (SSTP) implementation. SSTP is a VPN tunneling protocol that encapsulates PPP traffic over HTTPS, commonly used to securely connect remote clients to private networks. The vulnerability is classified under CWE-94, indicating an improper control of code generation, which typically involves unsafe handling of user-supplied input that leads to arbitrary code execution. The CVSS 3.1 base score of 8.1 reflects a high-impact vulnerability with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an unauthenticated attacker can remotely exploit this vulnerability over the network without user interaction, potentially executing arbitrary code with system-level privileges. The vulnerability affects Windows 10 Version 1809 build 17763.0, which is an older version of Windows 10 released in late 2018. Although no known exploits are reported in the wild as of the publication date, the severity and ease of exploitation make it a critical concern for organizations still running this version. The lack of available patches or mitigations in the provided data suggests that organizations must prioritize updating or applying vendor fixes once available. The vulnerability could allow attackers to gain full control over affected systems, leading to data breaches, lateral movement within networks, and disruption of services.
Potential Impact
For European organizations, the impact of CVE-2022-35766 is significant, especially for those still operating legacy Windows 10 Version 1809 systems. Exploitation could lead to full system compromise, exposing sensitive corporate data, intellectual property, and personal data protected under GDPR. The ability to execute code remotely without authentication or user interaction increases the risk of widespread automated attacks, ransomware deployment, or espionage activities. Critical infrastructure operators, financial institutions, healthcare providers, and government agencies in Europe could face operational disruptions and reputational damage. Additionally, the breach of confidentiality and integrity could result in regulatory penalties under European data protection laws. The vulnerability's network-based attack vector means that exposed VPN endpoints or remote access servers using SSTP are prime targets, which are common in remote work setups prevalent in Europe. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score necessitates urgent action to prevent potential exploitation.
Mitigation Recommendations
European organizations should immediately assess their environment to identify any systems running Windows 10 Version 1809 with SSTP enabled. Given the high severity and network exposure, the following specific mitigations are recommended: 1) Apply the latest Microsoft security updates or patches addressing CVE-2022-35766 as soon as they become available. 2) If patching is not immediately possible, disable SSTP VPN services temporarily or restrict SSTP access to trusted IP ranges via firewall rules to reduce exposure. 3) Implement network segmentation to isolate VPN servers from critical internal resources, limiting lateral movement if compromise occurs. 4) Monitor network traffic for unusual SSTP connection attempts or anomalies indicative of exploitation attempts. 5) Enforce strict access controls and multi-factor authentication on VPN endpoints to reduce unauthorized access risks. 6) Conduct vulnerability scanning and penetration testing focused on VPN infrastructure to identify and remediate weaknesses. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice by focusing on the SSTP protocol and legacy Windows 10 systems, which are the core of this threat.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2022-35766: Remote Code Execution in Microsoft Windows 10 Version 1809
Description
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2022-35766 is a high-severity remote code execution (RCE) vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Secure Socket Tunneling Protocol (SSTP) implementation. SSTP is a VPN tunneling protocol that encapsulates PPP traffic over HTTPS, commonly used to securely connect remote clients to private networks. The vulnerability is classified under CWE-94, indicating an improper control of code generation, which typically involves unsafe handling of user-supplied input that leads to arbitrary code execution. The CVSS 3.1 base score of 8.1 reflects a high-impact vulnerability with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an unauthenticated attacker can remotely exploit this vulnerability over the network without user interaction, potentially executing arbitrary code with system-level privileges. The vulnerability affects Windows 10 Version 1809 build 17763.0, which is an older version of Windows 10 released in late 2018. Although no known exploits are reported in the wild as of the publication date, the severity and ease of exploitation make it a critical concern for organizations still running this version. The lack of available patches or mitigations in the provided data suggests that organizations must prioritize updating or applying vendor fixes once available. The vulnerability could allow attackers to gain full control over affected systems, leading to data breaches, lateral movement within networks, and disruption of services.
Potential Impact
For European organizations, the impact of CVE-2022-35766 is significant, especially for those still operating legacy Windows 10 Version 1809 systems. Exploitation could lead to full system compromise, exposing sensitive corporate data, intellectual property, and personal data protected under GDPR. The ability to execute code remotely without authentication or user interaction increases the risk of widespread automated attacks, ransomware deployment, or espionage activities. Critical infrastructure operators, financial institutions, healthcare providers, and government agencies in Europe could face operational disruptions and reputational damage. Additionally, the breach of confidentiality and integrity could result in regulatory penalties under European data protection laws. The vulnerability's network-based attack vector means that exposed VPN endpoints or remote access servers using SSTP are prime targets, which are common in remote work setups prevalent in Europe. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score necessitates urgent action to prevent potential exploitation.
Mitigation Recommendations
European organizations should immediately assess their environment to identify any systems running Windows 10 Version 1809 with SSTP enabled. Given the high severity and network exposure, the following specific mitigations are recommended: 1) Apply the latest Microsoft security updates or patches addressing CVE-2022-35766 as soon as they become available. 2) If patching is not immediately possible, disable SSTP VPN services temporarily or restrict SSTP access to trusted IP ranges via firewall rules to reduce exposure. 3) Implement network segmentation to isolate VPN servers from critical internal resources, limiting lateral movement if compromise occurs. 4) Monitor network traffic for unusual SSTP connection attempts or anomalies indicative of exploitation attempts. 5) Enforce strict access controls and multi-factor authentication on VPN endpoints to reduce unauthorized access risks. 6) Conduct vulnerability scanning and penetration testing focused on VPN infrastructure to identify and remediate weaknesses. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice by focusing on the SSTP protocol and legacy Windows 10 systems, which are the core of this threat.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2022-07-13T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6838b90d182aa0cae28b8c7a
Added to database: 5/29/2025, 7:44:13 PM
Last enriched: 7/7/2025, 10:13:19 PM
Last updated: 7/30/2025, 8:08:39 PM
Views: 9
Related Threats
CVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.