CVE-2022-26925

Microsoft Windows — Microsoft Windows LSA Spoofing Vulnerability
⚠️ CVSS 3.1  8.1 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Microsoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM.

WARNING: This update is required on all Microsoft Windows endpoints but if deployed to domain controllers without additional configuration changes the update breaks PIV/CAC authentication. Read CISA implementation guidance carefully before deploying to domain controllers.; https://nvd.nist.gov/vuln/detail/CVE-2022-26925

Key Details

PropertyValue
CVE ID CVE-2022-26925
Vendor / Product Microsoft — Windows
NVD Published2022-05-10
NVD Last Modified2025-10-30
CVSS 3.1 Score8.1
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
SeverityHIGH
CWE CWE-306
CISA KEV Added2022-07-01
CISA KEV Deadline2022-07-22
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2022-07-22. Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch].

Timeline

DateEvent
2022-07-01Added to CISA Known Exploited Vulnerabilities catalog
2022-07-22CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2022-26925 Vulnerability Database
CISA KEV Catalog Entry US Government