• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Windows HTTP Stack Exploit Attempt - CVE-2022-21907

Risk Factors

This vulnerability can affect Windows devices running applications that employ HTTP.sys, such as Internet Information Services (IIS), Windows Remote Management WS-Management (WinRM), or Web Services for Devices (WSD). An attacker can cause a denial of service (DoS) or potentially gain complete control of a device. This exploit is wormable.

Kill Chain

Exploitation

Risk Score

94

Detection diagram
Next in Exploitation: Windows NFS Exploit Attempt - CVE-2020-17051

Attack Background

The HTTP Protocol Stack (HTTP.sys) is a kernel-mode device driver in Windows devices responsible for processing inbound HTTP requests and creating outbound HTTP responses. For example, HTTP.sys provides web server functionality to internet-facing applications such as Internet Information Services (IIS), Exchange, and Sharepoint. A vulnerability exists in how HTTP.sys processes incoming HTTP requests. An attacker crafts a sequence of HTTP requests to send to the vulnerable server. The sequence begins with several HTTP GET requests that have large headers. The sequence is completed with a malformed HTTP GET request that is missing an HTTP version token at the end of the request. HTTP.sys incorrectly processes the last malformed request in a way that corrupts a critical data structure in the kernel. The corrupt data structure can cause a denial of service (DoS) and potentially lead to remote command execution (RCE).

Mitigation Options

Install patches for relevant versions
For Windows Server 2019 and Windows 10 version 1809 that are not vulnerable by default (meaning that HTTP Trailer Support has been enabled), delete the DWORD registry value for EnableTrailerSupport in HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Parameters

MITRE ATT&CK ID

What else can RevealX do for you?