CVE-2022-37967 Windows Kerberos Elevation of Privilege Vulnerability

This post has been republished via RSS; it originally appeared at: MSRC Security Update Guide.

Microsoft is announcing the release of the third phase of Windows security updates to address this vulnerability. These updates remove the ability to disable PAC signature addition by setting the KrbtgtFullPacSignature subkey to a value of 0. Microsoft strongly recommends that customers install the June updates to be fully protected from this vulnerability, and review [How to manage the Kerberos and Netlogon Protocol changes related to CVE-2022-37967](https://support.microsoft.com/help/5020805) for further information. Customers whose Windows devices are configured to receive automatic updates do not need to take any further action.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.