Overview
Microsoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM.
WARNING: This update is required on all Microsoft Windows endpoints but if deployed to domain controllers without additional configuration changes the update breaks PIV/CAC authentication. Read CISA implementation guidance carefully before deploying to domain controllers.; https://nvd.nist.gov/vuln/detail/CVE-2022-26925
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2022-26925 |
| Vendor / Product | Microsoft — Windows |
| NVD Published | 2022-05-10 |
| NVD Last Modified | 2025-10-30 |
| CVSS 3.1 Score | 8.1 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-306 |
| CISA KEV Added | 2022-07-01 |
| CISA KEV Deadline | 2022-07-22 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2022-07-22.
Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch].
Timeline
| Date | Event |
|---|---|
| 2022-07-01 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2022-07-22 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2022-26925 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |