跳到主要內容區

網站訪問人數:145324

【漏洞預警】Windows Print Spooler存在高風險安全漏洞(CVE-2022-38028),請儘速確認並進行修補

發布日期 : 2024-04-26
教育機構ANA通報平台
發佈編號    TACERT-ANA-2024042604045151
發佈時間    2024-04-26 16:39:52
事故類型    ANA-漏洞預警    發現時間    2024-04-26 16:39:52
影響等級    中        
[主旨說明:]【漏洞預警】Windows Print Spooler存在高風險安全漏洞(CVE-2022-38028),請儘速確認並進行修補
[內容說明:]
轉發 國家資安資訊分享與分析中心 NISAC-200-202404-00000102
近期研究人員發現,特定駭客組織利用Windows Print Spooler服務之舊有漏洞(CVE-2022-38028)對外進行攻擊,由於該漏洞允許本機使用者提權至系統權限,且已遭駭客廣泛利用,請儘速確認並進行修補。 
情資分享等級: WHITE(情資內容為可公開揭露之資訊)
 
[影響平台:]
● Windows 10 for 32-bit Systems 
● Windows 10 for x64-based Systems 
● Windows 10 Version 1607 for 32-bit Systems 
● Windows 10 Version 1607 for x64-based Systems 
● Windows 10 Version 1809 for 32-bit Systems 
● Windows 10 Version 1809 for ARM64-based Systems 
● Windows 10 Version 1809 for x64-based Systems 
● Windows 10 Version 20H2 for 32-bit Systems 
● Windows 10 Version 20H2 for ARM64-based Systems 
● Windows 10 Version 21H1 for 32-bit Systems 
● Windows 10 Version 21H1 for ARM64-based Systems 
● Windows 10 Version 21H1 for x64-based Systems 
● Windows 10 Version 21H2 for 32-bit Systems 
● Windows 10 Version 21H2 for ARM64-based Systems 
● Windows 10 Version 21H2 for x64-based Systems 
● Windows 11 version 21H2 for ARM64-based Systems 
● Windows 11 version 21H2 for x64-based Systems 
● Windows 11 Version 22H2 for ARM64-based Systems 
● Windows 11 Version 22H2 for x64-based Systems 
● Windows 8.1 for 32-bit systems 
● Windows 8.1 for x64-based systems 
● Windows RT 8.1 Windows Server 2012 
● Windows Server 2012 (Server Core installation) 
● Windows Server 2012 R2 
● Windows Server 2012 R2 (Server Core installation) 
● Windows Server 2016 
● Windows Server 2016 (Server Core installation) 
● Windows Server 2019 
● Windows Server 2019 (Server Core installation) 
● Windows Server 2022 
● Windows Server 2022 (Server Core installation)

 
[建議措施:]
官方已針對漏洞釋出修復更新,請參考以下網址確認修補資訊: 
https://msrc.microsoft.com/update-guide/advisory/CVE-2022-38028
 
瀏覽數: