PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-22718 Microsoft CVE debrief

CVE-2022-22718 affects Microsoft Windows Print Spooler and is described as a privilege escalation vulnerability. CISA added it to the Known Exploited Vulnerabilities catalog on 2022-04-19, which makes it a priority for prompt remediation.

Vendor
Microsoft
Product
Windows
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-04-19
Original CVE updated
2022-04-19
Advisory published
2022-04-19
Advisory updated
2022-04-19

Who should care

Windows administrators, endpoint security teams, and any organization operating Microsoft Windows systems with the Print Spooler service enabled. Because this CVE is listed in CISA’s KEV catalog, patching and exposure review should be prioritized.

Technical summary

The supplied records identify a Microsoft Windows Print Spooler privilege escalation vulnerability. The corpus does not include deeper technical mechanics, affected versions, or exploit preconditions. The key defensive point is that this is a Windows elevation-of-privilege issue involving the Print Spooler component and is tracked by CISA as known exploited.

Defensive priority

High. CISA placed this CVE in KEV on 2022-04-19 and assigned a remediation due date of 2022-05-10, so it should be treated as an urgent patch-and-verify item.

Recommended defensive actions

  • Apply Microsoft updates per vendor instructions as soon as possible.
  • Prioritize patch rollout for critical and broadly deployed Windows systems.
  • Review whether the Print Spooler service is necessary on each system and reduce exposure where possible, following Microsoft guidance.
  • Confirm remediation in vulnerability management and endpoint inventory reports.
  • Monitor Windows systems for signs of unusual privilege escalation activity.

Evidence notes

Source evidence is limited to the CVE record and CISA’s Known Exploited Vulnerabilities feed. The CVE was published and modified on 2022-04-19, matching the KEV dateAdded value. The KEV metadata includes the required action "Apply updates per vendor instructions," a due date of 2022-05-10, and a notes reference to the NVD record. No CVSS score was provided in the supplied corpus.

Official resources

Public record context in the supplied corpus is 2022-04-19, which matches the CVE published/modified date and CISA KEV dateAdded.