CVE Vulnerabilities

CVE-2022-21997

Improper Link Resolution Before File Access ('Link Following')

Published: Feb 09, 2022 | Modified: Aug 08, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
3.6 LOW
AV:L/AC:L/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

Windows Print Spooler Elevation of Privilege Vulnerability

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Windows_10 Microsoft - (including) - (including)
Windows_10 Microsoft 20h2 (including) 20h2 (including)
Windows_10 Microsoft 21h1 (including) 21h1 (including)
Windows_10 Microsoft 21h2 (including) 21h2 (including)
Windows_10 Microsoft 1607 (including) 1607 (including)
Windows_10 Microsoft 1809 (including) 1809 (including)
Windows_10 Microsoft 1909 (including) 1909 (including)
Windows_11 Microsoft - (including) - (including)
Windows_7 Microsoft sp1 (including) sp1 (including)
Windows_8.1 Microsoft - (including) - (including)
Windows_rt_8.1 Microsoft - (including) - (including)
Windows_server Microsoft 20h2 (including) 20h2 (including)
Windows_server Microsoft 2022 (including) 2022 (including)
Windows_server_2008 Microsoft –sp2 (including) –sp2 (including)
Windows_server_2008 Microsoft r2-sp1 (including) r2-sp1 (including)
Windows_server_2012 Microsoft - (including) - (including)
Windows_server_2012 Microsoft r2 (including) r2 (including)
Windows_server_2016 Microsoft - (including) - (including)
Windows_server_2019 Microsoft - (including) - (including)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References