PatchSiren cyber security CVE debrief
CVE-2022-41073 Microsoft CVE debrief
CVE-2022-41073 is a Microsoft Windows Print Spooler privilege escalation vulnerability that CISA added to its Known Exploited Vulnerabilities catalog on 2022-11-08. CISA’s KEV entry marks it as known exploited and notes known ransomware campaign use, which makes remediation a priority for Windows environments that have not yet confirmed vendor updates. The supplied authoritative guidance is straightforward: apply updates per vendor instructions.
- Vendor
- Microsoft
- Product
- Windows
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-11-08
- Original CVE updated
- 2022-11-08
- Advisory published
- 2022-11-08
- Advisory updated
- 2022-11-08
Who should care
Windows administrators, endpoint security teams, patch-management owners, and incident responders should care, especially if they manage systems where the Windows Print Spooler service is enabled or if they track CISA KEV remediation obligations.
Technical summary
The source corpus identifies CVE-2022-41073 as a Microsoft Windows Print Spooler privilege escalation vulnerability. No CVSS score or exploit details were supplied in the corpus, but CISA classifies it as a known exploited vulnerability and associates it with known ransomware campaign use. The defensive takeaway is to treat it as an urgent remediation item and follow Microsoft’s advisory guidance linked from the KEV entry.
Defensive priority
Urgent
Recommended defensive actions
- Apply the Microsoft updates referenced in the vendor advisory as soon as possible.
- Confirm that all Windows systems in scope for print services have been remediated and are no longer exposed to this KEV item.
- Track this CVE in patch-compliance reporting until remediation is complete, using the CISA KEV due date as the benchmark for response timeliness.
- Review the linked Microsoft and NVD records for any vendor-specific guidance or clarification relevant to your environment.
Evidence notes
This debrief is based only on the supplied official/authority sources: the CISA KEV feed entry, the CVE record, and the linked NVD and Microsoft advisory references. The corpus provides the CVE title, KEV date-added value (2022-11-08), due date (2022-12-09), and known ransomware campaign use flag, but no CVSS score or technical exploit narrative.
Official resources
-
CVE-2022-41073 CVE record
CVE.org
-
CVE-2022-41073 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Publicly published and modified on 2022-11-08 in the supplied CVE metadata. CISA added the item to KEV on 2022-11-08 and set a remediation due date of 2022-12-09.