If you don’t already have the KEV in your threat intel feed, now’s the time to add it. Oh, and make sure you patch…:
[…] According to a November binding operational directive (BOD 22-01), all Federal Civilian Executive Branch Agencies (FCEB) agencies have to secure their systems against security flaws added to CISA’s catalog of Known Exploited Vulnerabilities (KEV).
CISA has given the agencies three weeks, until May 10th, to patch the now actively exploited CVE-2022-22718 vulnerability and block ongoing exploitation attempts.
Even though this directive only applies to US federal agencies, CISA also strongly urges all US organizations to fix this Windows Print Spooler elevation of privilege bug to thwart attempts to escalate privileges on their Windows systems.