CISA adds Windows Print Spooler to its Known Exploited Vulnerabilities Catalog

Pierluigi Paganini April 20, 2022

US Critical Infrastructure Security Agency (CISA) adds a Windows Print Spooler vulnerability to its Known Exploited Vulnerabilities Catalog.

The Cybersecurity and Infrastructure Security Agency (CISA) added the Windows Print Spooler, tracked as CVE-2022-22718, to its Known Exploited Vulnerabilities Catalog.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts recommend also private organizations review the Catalog and address the vulnerabilities in their infrastructure.

The CVE-2022-22718 flaw is a Windows Print Spooler Elevation of Privilege issue that has been rated as high severity and received a CVSS score of 7.8.

The Windows Print Spooler vulnerability was addressed by Microsoft with the release of February 2022 Patch Tuesday security updates along with other 50 flaws in multiple products.

Below is the complete list of flaws added by CISA to its Known Exploited Vulnerabilities Catalog in the latest turn:

cisa Known Exploited Vulnerabilities Catalog 4

The above issues have to be addressed by federal agencies by May 10, 2022

Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: 
https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform  

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Windows Print Spooler)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment