Skip to main content

CVE-2022-35771: Elevation of Privilege in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2022-35771cvecve-2022-35771
Published: Tue Aug 09 2022 (08/09/2022, 19:58:15 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Defender Credential Guard Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 22:25:53 UTC

Technical Analysis

CVE-2022-35771 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically impacting the Windows Defender Credential Guard component. Credential Guard is a security feature designed to isolate and protect derived domain credentials, such as NTLM hashes and Kerberos tickets, by running them in a secure, isolated environment using virtualization-based security. This vulnerability, classified under CWE-269 (Improper Privilege Management), allows an attacker with limited privileges (low-level privileges) on a vulnerable system to escalate their privileges to higher levels, potentially SYSTEM or administrative privileges, without requiring user interaction. The CVSS v3.1 base score of 7.8 reflects the significant impact on confidentiality, integrity, and availability, with an attack vector requiring local access (AV:L), low complexity (AC:L), and low privileges (PR:L). The vulnerability does not require user interaction (UI:N) and affects the same security scope (S:U). Exploiting this flaw could allow an attacker to bypass Credential Guard protections, gaining access to sensitive credential material and potentially compromising the entire system or network. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for organizations still running Windows 10 Version 1809, which is an older release with extended support. The lack of publicly available patches at the time of reporting increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those operating legacy systems or environments where Windows 10 Version 1809 remains in use. Successful exploitation could lead to unauthorized privilege escalation, enabling attackers to access sensitive credentials protected by Credential Guard, potentially leading to lateral movement within corporate networks, data exfiltration, or disruption of critical services. Sectors such as finance, healthcare, government, and critical infrastructure, which often have stringent security requirements and handle sensitive data, could face severe consequences including regulatory penalties under GDPR if breaches occur. The vulnerability undermines a key security control designed to protect credentials, increasing the risk of persistent threats and advanced attacks. Additionally, the local attack vector implies that insider threats or attackers who have gained initial footholds through other means could leverage this vulnerability to deepen their access and control.

Mitigation Recommendations

European organizations should prioritize upgrading or patching affected systems to versions of Windows 10 beyond 1809 where this vulnerability is resolved. In the absence of official patches, organizations should implement strict access controls to limit local user privileges and restrict the ability to execute untrusted code. Employing application whitelisting and endpoint detection and response (EDR) solutions can help detect and prevent exploitation attempts. Network segmentation should be enforced to limit lateral movement if an attacker gains local access. Regular auditing of privileged accounts and monitoring for unusual privilege escalation activities are critical. Additionally, organizations should consider disabling or restricting Credential Guard only if absolutely necessary and with full understanding of the security trade-offs. Maintaining up-to-date asset inventories to identify systems running vulnerable versions is essential for targeted remediation. Finally, user training to reduce the risk of initial compromise and maintaining robust incident response plans will help mitigate the broader impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-07-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838b59f182aa0cae28b0d05

Added to database: 5/29/2025, 7:29:35 PM

Last enriched: 7/7/2025, 10:25:53 PM

Last updated: 7/28/2025, 7:54:35 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats