Skip to main content

CVE-2022-35766: Remote Code Execution in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2022-35766cvecve-2022-35766
Published: Tue Aug 09 2022 (08/09/2022, 19:57:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 22:13:19 UTC

Technical Analysis

CVE-2022-35766 is a high-severity remote code execution (RCE) vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Secure Socket Tunneling Protocol (SSTP) implementation. SSTP is a VPN tunneling protocol that encapsulates PPP traffic over HTTPS, commonly used to securely connect remote clients to private networks. The vulnerability is classified under CWE-94, indicating an improper control of code generation, which typically involves unsafe handling of user-supplied input that leads to arbitrary code execution. The CVSS 3.1 base score of 8.1 reflects a high-impact vulnerability with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an unauthenticated attacker can remotely exploit this vulnerability over the network without user interaction, potentially executing arbitrary code with system-level privileges. The vulnerability affects Windows 10 Version 1809 build 17763.0, which is an older version of Windows 10 released in late 2018. Although no known exploits are reported in the wild as of the publication date, the severity and ease of exploitation make it a critical concern for organizations still running this version. The lack of available patches or mitigations in the provided data suggests that organizations must prioritize updating or applying vendor fixes once available. The vulnerability could allow attackers to gain full control over affected systems, leading to data breaches, lateral movement within networks, and disruption of services.

Potential Impact

For European organizations, the impact of CVE-2022-35766 is significant, especially for those still operating legacy Windows 10 Version 1809 systems. Exploitation could lead to full system compromise, exposing sensitive corporate data, intellectual property, and personal data protected under GDPR. The ability to execute code remotely without authentication or user interaction increases the risk of widespread automated attacks, ransomware deployment, or espionage activities. Critical infrastructure operators, financial institutions, healthcare providers, and government agencies in Europe could face operational disruptions and reputational damage. Additionally, the breach of confidentiality and integrity could result in regulatory penalties under European data protection laws. The vulnerability's network-based attack vector means that exposed VPN endpoints or remote access servers using SSTP are prime targets, which are common in remote work setups prevalent in Europe. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score necessitates urgent action to prevent potential exploitation.

Mitigation Recommendations

European organizations should immediately assess their environment to identify any systems running Windows 10 Version 1809 with SSTP enabled. Given the high severity and network exposure, the following specific mitigations are recommended: 1) Apply the latest Microsoft security updates or patches addressing CVE-2022-35766 as soon as they become available. 2) If patching is not immediately possible, disable SSTP VPN services temporarily or restrict SSTP access to trusted IP ranges via firewall rules to reduce exposure. 3) Implement network segmentation to isolate VPN servers from critical internal resources, limiting lateral movement if compromise occurs. 4) Monitor network traffic for unusual SSTP connection attempts or anomalies indicative of exploitation attempts. 5) Enforce strict access controls and multi-factor authentication on VPN endpoints to reduce unauthorized access risks. 6) Conduct vulnerability scanning and penetration testing focused on VPN infrastructure to identify and remediate weaknesses. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response. These targeted actions go beyond generic advice by focusing on the SSTP protocol and legacy Windows 10 systems, which are the core of this threat.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-07-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838b90d182aa0cae28b8c7a

Added to database: 5/29/2025, 7:44:13 PM

Last enriched: 7/7/2025, 10:13:19 PM

Last updated: 7/30/2025, 8:08:39 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats