Apr 2022: Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2022-26807 Published on April 15, 2022

Windows Work Folder Service Elevation of Privilege Vulnerability
Windows Work Folder Service Elevation of Privilege Vulnerability

Vendor Advisory NVD

Weakness Type

What is a Race Condition Vulnerability?

The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.

CVE-2022-26807 has been classified to as a Race Condition vulnerability or weakness.


Products Associated with CVE-2022-26807

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-26807 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 10 Version 1809: Microsoft Windows 10 Version 1809: Microsoft Windows Server 2019: Microsoft Windows Server 2019 (Server Core installation): Microsoft Windows 10 Version 1909: Microsoft Windows 10 Version 21H1: Microsoft Windows Server 2022: Microsoft Windows 10 Version 20H2: Microsoft Windows Server version 20H2: Microsoft Windows 11 version 21H2: Microsoft Windows 10 Version 21H2: Microsoft Windows 10 Version 1507: Microsoft Windows 10 Version 1607: Microsoft Windows Server 2016: Microsoft Windows Server 2016 (Server Core installation): Microsoft Windows 7: Microsoft Windows 7 Service Pack 1: Microsoft Windows 8.1: Microsoft Windows Server 2008 R2 Service Pack 1: Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation): Microsoft Windows Server 2012 R2: Microsoft Windows Server 2012 R2 (Server Core installation):

Exploit Probability

EPSS
0.15%
Percentile
35.96%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.