INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h Global vulnerability Enterprise Software and Database Management CRITICAL 2h Global vulnerability Information Technology CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software CRITICAL 3h Global vulnerability Information Technology HIGH 3h Global data_breach Government CRITICAL 12h Global ransomware Financial Services / Cybersecurity CRITICAL 13h Global vulnerability Information Technology / Cybersecurity CRITICAL 15h Global malware Energy and Utilities CRITICAL 16h Global ransomware Multiple sectors CRITICAL 16h
Vulnerabilities

CVE-2002-0367

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Windows SMSS.exe Authentication Bypass Privilege Escalation (CVE-2002-0367)
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Windows Privilege Escalation Vulnerability — smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.

🤖 AI Executive Summary

Critical privilege escalation vulnerability in Windows Session Manager Subsystem (smss.exe) allows local attackers to gain SYSTEM privileges through improper authentication of inter-process connections. Active exploits exist with no patch available, posing severe risk to legacy Windows systems still in operation.

📄 Description (Arabic)

تؤثر هذه الثغرة على نظام إدارة الجلسات الفرعي (smss.exe) في أنظمة مايكروسوفت ويندوز القديمة، حيث يفشل النظام في التحقق بشكل صحيح من هوية البرامج التي تتصل ببرامج أخرى. يمكن للمهاجم المحلي استغلال هذا الضعف للحصول على صلاحيات المسؤول أو صلاحيات النظام الكاملة (SYSTEM). نظراً لعدم توفر تحديث أمني ووجود استغلالات فعلية، تشكل هذه الثغرة خطراً كبيراً على المؤسسات التي لا تزال تشغل أنظمة ويندوز القديمة في بيئاتها التشغيلية أو الصناعية.

🤖 ملخص تنفيذي (AI)

ثغرة حرجة لتصعيد الصلاحيات في نظام إدارة الجلسات بويندوز (smss.exe) تسمح للمهاجمين المحليين بالحصول على صلاحيات النظام الكاملة من خلال ضعف المصادقة بين العمليات. توجد استغلالات نشطة دون وجود تحديث أمني، مما يشكل خطراً شديداً على أنظمة ويندوز القديمة المستخدمة.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 08:39
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations running legacy Windows systems in industrial control environments, healthcare facilities, or isolated networks face critical risk of complete system compromise. Attackers with local access can escalate to SYSTEM privileges, bypassing all security controls and potentially accessing sensitive data governed by PDPL or disrupting critical infrastructure.
🏢 Affected Saudi Sectors
القطاع الصحي القطاع الصناعي البنية التحتية الحرجة القطاع المالي القطاع الحكومي قطاع الطاقة
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately isolate and inventory all legacy Windows systems (Windows 2000/NT) still in operation, prioritizing those in critical infrastructure or with network connectivity.
2. Implement strict network segmentation and access controls to prevent unauthorized local access to affected systems, enforcing multi-factor authentication and privileged access management.
3. Develop and execute a migration plan to upgrade all legacy Windows systems to supported versions (Windows 10/11 or Windows Server 2019/2022) within 90 days, or air-gap systems that cannot be upgraded with continuous monitoring.
🔧 خطوات المعالجة (العربية)
1. عزل وجرد جميع أنظمة ويندوز القديمة (Windows 2000/NT) المستخدمة فوراً، مع إعطاء الأولوية للأنظمة في البنية التحتية الحرجة أو المتصلة بالشبكة.
2. تطبيق تجزئة صارمة للشبكة وضوابط الوصول لمنع الوصول المحلي غير المصرح به للأنظمة المتأثرة، مع فرض المصادقة متعددة العوامل وإدارة الوصول المميز.
3. تطوير وتنفيذ خطة ترحيل لترقية جميع أنظمة ويندوز القديمة إلى إصدارات مدعومة (Windows 10/11 أو Windows Server 2019/2022) خلال 90 يوماً، أو عزل الأنظمة التي لا يمكن ترقيتها مع مراقبة مستمرة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-4-1 ECC-5-1
🔵 SAMA CSF
CCC-1.1 CCC-2.1 CCC-4.2 CCC-5.1 TRM-1.1
🟡 ISO 27001:2022
A.12.6.1 A.12.6.2 A.14.2.2 A.18.2.2 A.18.2.3
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Windows
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-24
Published 2022-03-03
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.