一、背景介绍
6月16日,市委网信办技术支撑单位监测到 Windows SMB 拒绝服务漏洞细节及PoC在互联网公开。目前,官方已经发布补丁,建议用户尽快升级至最新版本。
1.1漏洞描述
Windows SMB 在处理请求的过程中存在空指针引用缺陷,未经身份验证的远程攻击者可通过向 Microsoft Windows 域控制器发送特制请求来利用此漏洞,从而导致目标系统拒绝服务
1.2漏洞编号:CVE-2022-32230
1.3漏洞等级:高危
二、修复建议
2.1 受影响版本
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
2.2 修复建议
目前官方已发布安全补丁与新版本修复了该漏洞,请受影响的用户尽快更新版本进行防护。
官方下载链接:https://msrc.microsoft.com/update-guide/releaseNote/2022-Jun