Description Preview
Overview
- CVE ID: CVE-2022-38028
- Published Date: October 11, 2022
- Last Updated: January 2, 2025
- Severity: High (CVSS Base Score: 7.8)
- Impact: Elevation of Privilege
- Affected Products:
- Windows 10 (various versions)
- Windows Server 2019
- Windows Server 2022
- Windows 11 (various versions)
- Windows 8.1
- Windows Server 2012 and 2012 R2
- Windows Server 2016
Remediation
To mitigate the risks associated with CVE-2022-38028, Microsoft recommends applying the latest security updates for affected Windows versions. Users should ensure that their systems are updated to versions that are not vulnerable:
- For Windows 10 Version 1809, ensure the version is updated to 10.0.17763.3532 or later.
- For Windows Server 2019, ensure the version is updated to 10.0.17763.3532 or later.
- For other affected versions, refer to the specific version requirements listed in the CVE details.
Additionally, organizations should consider disabling the Print Spooler service if it is not required, and implement strict access controls to limit the ability to exploit this vulnerability.
References
Early Warning
Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.
- Armis Alert Date
- Oct 11, 2022
- CISA KEV Date
- Apr 23, 2024
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Public AdministrationPublic Administration: Medium
- ManufacturingManufacturing: Medium
- Health Care & Social AssistanceHealth Care & Social Assistance: Medium
- Educational ServicesEducational Services: Medium
- Transportation & WarehousingTransportation & Warehousing: Medium
- Finance and InsuranceFinance and Insurance: Medium
- Retail TradeRetail Trade: Medium
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Medium
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Medium
- UtilitiesUtilities: Medium
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- MiningMining: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- ConstructionConstruction: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Wholesale TradeWholesale Trade: Low