CVE-2022-41120
Sysmon vulnerability analysis and mitigation

Overview

Microsoft Windows System Monitor (Sysmon) Elevation of Privilege Vulnerability, identified as CVE-2022-41120, was discovered and reported in June 2022. The vulnerability affects Sysmon versions 12.0 through 14.12, specifically targeting the ClipboardChange event functionality that was introduced in version 12.0. The vulnerability was officially disclosed in November 2022 with a CVSS score of 7.8 (Security Online).

Technical details

The vulnerability exists in the code responsible for the ClipboardChange event that can be accessed through RPC. Local users can send data to the RPC server, which is then written to the C:\Sysmon directory (default ArchiveDirectory) and subsequently deleted. In versions before 14.11, Sysmon failed to verify if the directory was created by a low-privilege user or if it's a junction, which could be exploited to perform arbitrary file delete/write operations in the context of NT AUTHORITY\SYSTEM user (Security Online).

Impact

Successful exploitation of this vulnerability allows an authenticated attacker to gain administrator privileges by elevating from local user to SYSTEM admin. The attacker could execute arbitrary code with higher system privileges (Security Online).

Mitigation and workarounds

Microsoft released Sysmon v14.13 on November 28, 2022, which addresses the vulnerability by ensuring the archive directory has permissions restricted to the system account. For users unable to update to the latest version, a temporary workaround involves creating an ArchiveDirectory (C:\Sysmon by default) and setting permissions to only allow access to the NT AUTHORITY\SYSTEM account (Microsoft QA, Security Online).

Community reactions

Security researchers actively discussed the vulnerability on social media, with researcher Filip Dragovic confirming that even version 14.12 remained vulnerable to the exploit (Microsoft QA).

Additional resources


SourceThis report was generated using AI

Related Sysmon vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-29343HIGH7.8
  • SysmonSysmon
  • cpe:2.3:a:microsoft:windows_sysmon
NoYesMay 09, 2023
CVE-2022-44704HIGH7.8
  • SysmonSysmon
  • cpe:2.3:a:microsoft:windows_sysmon
NoYesDec 13, 2022
CVE-2022-41120HIGH7.8
  • SysmonSysmon
  • cpe:2.3:a:microsoft:windows_sysmon
NoYesNov 09, 2022

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management