• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Windows HTTP Stack Exploit Attempt - CVE-2021-31166

Risk Factors

This vulnerability can affect Windows devices running applications that employ HTTP.sys, such as Internet Information Services (IIS), Windows Remote Management WS-Management (WinRM), or Web Services for Devices (WSD). An unauthenticated attacker can leverage public exploit code to create a denial of service (DoS). The vulnerability can also enable an attacker to gain complete control of a device.

Kill Chain

Exploitation

Risk Score

92

Detection diagram
Next in Exploitation: Windows HTTP Stack Exploit Attempt - CVE-2022-21907

Attack Background

The HTTP Protocol Stack (HTTP.sys) is a kernel-mode device driver in Windows devices responsible for processing inbound HTTP requests and creating outbound HTTP responses. For example, HTTP.sys provides web server functionality to internet-facing applications such as Internet Information Services (IIS), Exchange, and SharePoint. A vulnerability exists in how HTTP.sys processes incoming HTTP requests with manipulated Accept-Encoding headers. An attacker crafts a combination of particular Accept-Encoding values that causes HTTP.sys to incorrectly process the request in a way that corrupts a critical data structure in the kernel. The corrupt data structure can lead to remote command execution (RCE) or a denial of service (DoS).

Mitigation Options

Install patches for relevant versions

MITRE ATT&CK ID

What else can RevealX do for you?