Defense
Vulnerability Information
| Rating | Critical |
| CVE | cve-2022-26809 |
| MITRE | CVE – CVE-2022-26809 (mitre.org) |
| CVSS | CVSS:3.1 9.8 |
| Impact | Remote Code Execution (RCE) |
| Exploit in the wild | Currently not observed |
| Difficulty to Exploit (if PoC available) | Very Low |
| Network Position | TCP/IP Routable or Network Adjacent |
| Authentication Required to Exploit | No |
| Affected | Windows Client/Server OS |
| Typical Service Ports | TCP 135,139,445 |
| Vendor Patch Available | Yes |
| Exploitable in Default OOB (out of the box) configuration | Unknown |
| Exploitable Client/Server | Believed to be client and server side exploitable |
Vendor Information
Global Internet Exposure (RPC)


Guidance
- Ideally patch affected Windows Servers and Clients
Mitigation
- Ensure RPC is not exposed to the internet
- Restrict ingress network services that allow RPC (this could cause loss of availability)
- Restrict service based on role
- Restrict ingress services to specific segments/scopes e.g., use Windows Firewall to allow PAWS to connect via RPC for remote admin activities. Clearly consideration should be made for roles such as:
- Domain Controllers
- File & Print Servers
- Other services relying on RPC to operate
- Consider preparing a break glass GPO with restrictive host-based firewall rules allowing PAWS access)
Unknowns
- Does this affect RPC over HTTP?
Network Scanning
There’s no specific vulneability checker at present you could:
nmap -sV -p 135,139,445 -vvv -T4 -A --open 192.168.0.0/24
RPC Dynamic Scan with XML HTML Report
Fast
nmap -Pn -sV -sC -p 135,139,445,49152-49160 -v -T4 -O -oA rpc-report --open --stylesheet https://raw.githubusercontent.com/honze-net/nmap-bootstrap-xsl/master/nmap-bootstrap.xsl [TargetIP/CIDR]
Full Dynamic range
nmap -Pn -sV -sC -p 135,139,445,49152-49160 -v -T4 -O -oA rpc-report --open --stylesheet https://raw.githubusercontent.com/honze-net/nmap-bootstrap-xsl/master/nmap-bootstrap.xsl [TargetIP/CIDR]
nmap -Pn -sV -sC -p 135,139,445,49152-65535 -v -T4 -O -oA rpc-report --open --stylesheet https://raw.githubusercontent.com/honze-net/nmap-bootstrap-xsl/master/nmap-bootstrap.xsl [TargetIP/CIDR]
or use WIRM or other tool to check for the required patch
Common RPC Ports
RPC Control TCP PORTS (WINDOWS)
135
139
445
Dyanmic RPC TCP range
49152-65535
Common Dynamic Ports In Use
Common RPC
49152
49153
49154
49157
RPC Information
Remote Procedure Call (RPC) dynamic port work with firewalls – Windows Server | Microsoft Docs








