May 2022: Windows LSA Spoofing Vulnerability
CVE-2022-26925 Published on May 10, 2022
Windows LSA Spoofing Vulnerability
Windows LSA Spoofing Vulnerability
Known Exploited Vulnerability
This Microsoft Windows LSA Spoofing Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM.
The following remediation steps are recommended / required by June 1, 2022: Apply updates per vendor instructions.
Weakness Type
Missing Authentication for Critical Function
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Products Associated with CVE-2022-26925
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-26925 are published in these products:
Affected Versions
Microsoft Windows 10 Version 1809:- Version 10.0.17763.0 and below 10.0.17763.2928 is affected.
- Version 10.0.0 and below 10.0.17763.2928 is affected.
- Version 10.0.17763.0 and below 10.0.17763.2928 is affected.
- Version 10.0.17763.0 and below 10.0.17763.2928 is affected.
- Version 10.0.0 and below 10.0.18363.2274 is affected.
- Version 10.0.0 and below 10.0.19043.1706 is affected.
- Version 10.0.20348.0 and below 10.0.20348.707 is affected.
- Version 10.0.0 and below 10.0.19042.1706 is affected.
- Version 10.0.0 and below 10.0.19042.1706 is affected.
- Version 10.0.0 and below 10.0.22000.675 is affected.
- Version 10.0.19043.0 and below 10.0.19043.1706 is affected.
- Version 10.0.10240.0 and below 10.0.10240.19297 is affected.
- Version 10.0.14393.0 and below 10.0.14393.5125 is affected.
- Version 10.0.14393.0 and below 10.0.14393.5125 is affected.
- Version 10.0.14393.0 and below 10.0.14393.5125 is affected.
- Version 6.1.0 and below 6.1.7601.25954 is affected.
- Version 6.1.0 and below 6.1.7601.25954 is affected.
- Version 6.3.0 and below 6.3.9600.20371 is affected.
- Version 6.0.6003.0 and below 6.0.6003.21481 is affected.
- Version 6.0.6003.0 and below 6.0.6003.21481 is affected.
- Version 6.0.6003.0 and below 6.0.6003.21481 is affected.
- Version 6.1.7601.0 and below 6.1.7601.25954 is affected.
- Version 6.1.7601.0 and below 6.1.7601.25954 is affected.
- Version 6.2.9200.0 and below 6.2.9200.23714 is affected.
- Version 6.2.9200.0 and below 6.2.9200.23714 is affected.
- Version 6.3.9600.0 and below 6.3.9600.20371 is affected.
- Version 6.3.9600.0 and below 6.3.9600.20371 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.