跳到主要內容區

【漏洞預警】Windows Print Spooler存在高風險安全漏洞(CVE-2022-38028),請儘速確認並進行修補

教育機構ANA通報平台

發佈編號 TACERT-ANA-2024042604045151
發佈時間 2024-04-26 16:39:52
事故類型 ANA-漏洞預警        
發現時間 2024-04-26 16:39:52
影響等級 中                

[主旨說明:]【漏洞預警】Windows Print Spooler存在高風險安全漏洞(CVE-2022-38028),請儘速確認並進行修補

[內容說明:]
轉發 國家資安資訊分享與分析中心 NISAC-200-202404-00000102

近期研究人員發現,特定駭客組織利用Windows Print Spooler服務之舊有漏洞(CVE-2022-38028)對外進行攻擊,由於該漏洞允許本機使用者提權至系統權限,且已遭駭客廣泛利用,請儘速確認並進行修補。

情資分享等級: WHITE(情資內容為可公開揭露之資訊)

此訊息僅發送到「區縣市網路中心」,煩請貴單位協助公告或轉發

[影響平台:]
● Windows 10 for 32-bit Systems
● Windows 10 for x64-based Systems
● Windows 10 Version 1607 for 32-bit Systems ● Windows 10 Version 1607 for x64-based Systems ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows 10 Version 21H2 for 32-bit Systems ● Windows 10 Version 21H2 for ARM64-based Systems ● Windows 10 Version 21H2 for x64-based Systems ● Windows 11 version 21H2 for ARM64-based Systems ● Windows 11 version 21H2 for x64-based Systems ● Windows 11 Version 22H2 for ARM64-based Systems ● Windows 11 Version 22H2 for x64-based Systems ● Windows 8.1 for 32-bit systems ● Windows 8.1 for x64-based systems ● Windows RT 8.1 Windows Server 2012 ● Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server 2022 ● Windows Server 2022 (Server Core installation)

[建議措施:]
官方已針對漏洞釋出修復更新,請參考以下網址確認修補資訊:
https://msrc.microsoft.com/update-guide/advisory/CVE-2022-38028

[參考資料:]
1. https://msrc.microsoft.com/update-guide/advisory/CVE-2022-38028
2. https://nvd.nist.gov/vuln/detail/CVE-2022-38028
3. https://www.cisa.gov/known-exploited-vulnerabilities-catalog

(此通報僅在於告知相關資訊,並非為資安事件),如果您對此通報的內容有疑問或有關於此事件的建議,歡迎與我們連絡。
教育機構資安通報應變小組
網址:https://info.cert.tanet.edu.tw/
專線電話:07-5250211
網路電話:98400000
E-Mail:service@cert.tanet.edu.tw

瀏覽數: