Windows Recovery Environment BitLocker Bypass (KB5025175)

medium Nessus Plugin ID 174991

Synopsis

The remote Windows host may be affected by a security feature bypass vulnerability.

Description

The remote Windows host has not had the post-update scripts described in Microsoft KB5025175 executed. It may, therefore, be affected by a BitLocker security feature bypass vulnerability if the Windows Recovery Environment (WinRE) has not been update by an alternative method.

Note that Nessus has not tested for these issues but has instead relied only on the absence of breadcrumbs placed on the system by the remediation script.

Solution

Run the update scripts as described in KB5025175

See Also

https://support.microsoft.com/help/5025175

Plugin Details

Severity: Medium

ID: 174991

File Name: smb_nt_ms23_mar_5025175_winre.nasl

Version: 1.3

Type: local

Agent: windows

Published: 5/2/2023

Updated: 6/21/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2022-41099

CVSS v3

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 4.3

Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersionBuild, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/16/2023

Vulnerability Publication Date: 11/8/2022

Reference Information

CVE: CVE-2022-41099

MSFT: MS23-5025175

MSKB: 5025175