The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-29799

CVE-2022-29799: Windows Defender Path Traversal Flaw

CVE-2022-29799 is a path traversal vulnerability in Microsoft Windows Defender For Endpoint allowing directory traversal attacks. This article covers the technical details, affected versions, and remediation steps.

Published: February 17, 2026

CVE-2022-29799 Overview

CVE-2022-29799 is a directory traversal vulnerability discovered in networkd-dispatcher, a component used on Linux systems. This flaw exists because the OperationalState and AdministrativeState functions within networkd-dispatcher fail to properly sanitize input, allowing attackers to escape from the /etc/networkd-dispatcher base directory. This vulnerability, part of a chain dubbed "Nimbuspwn" by Microsoft researchers, can be leveraged for privilege escalation on affected Linux systems.

Critical Impact

Attackers with local access can exploit this directory traversal vulnerability to escape the intended directory structure, potentially leading to unauthorized file access and privilege escalation when chained with related vulnerabilities.

Affected Products

  • Microsoft Windows Defender for Endpoint (Linux)
  • networkd-dispatcher on Linux systems

Discovery Timeline

  • 2022-04-26 - Microsoft publishes security blog post on Nimbuspwn vulnerabilities
  • 2022-09-21 - CVE-2022-29799 published to NVD
  • 2025-05-27 - Last updated in NVD database

Technical Details for CVE-2022-29799

Vulnerability Analysis

CVE-2022-29799 is a classic directory traversal vulnerability (CWE-22) affecting the networkd-dispatcher service on Linux systems. The vulnerability allows local attackers to break out of the restricted /etc/networkd-dispatcher directory by manipulating the OperationalState or AdministrativeState parameters that are passed to the dispatcher.

The networkd-dispatcher service runs as root and is designed to execute scripts based on network state changes. When a network state change occurs, the service constructs file paths using the state values without proper sanitization. An attacker can inject path traversal sequences such as ../ into these state values, causing the service to access files outside the intended directory hierarchy.

This vulnerability is particularly significant as it forms part of the "Nimbuspwn" vulnerability chain. When combined with CVE-2022-29800 (a symlink race condition), attackers can achieve full root privilege escalation on vulnerable Linux systems.

Root Cause

The root cause lies in the lack of input validation and sanitization in networkd-dispatcher when handling the OperationalState and AdministrativeState values. The service directly uses these values to construct file paths without verifying that they do not contain path traversal characters or sequences. This allows malicious actors to craft state values containing sequences like ../ to navigate outside the intended directory structure.

Attack Vector

The attack requires local access to the target system. An attacker with low privileges can exploit this vulnerability by manipulating D-Bus messages sent to the networkd-dispatcher service. By crafting malicious state values containing directory traversal sequences, the attacker can cause the dispatcher to access or execute files from arbitrary locations on the filesystem.

The vulnerability is exploited through the D-Bus interface where network state changes are communicated. Since networkd-dispatcher runs with root privileges, successfully escaping the base directory can lead to significant security implications, especially when combined with other vulnerabilities in the Nimbuspwn chain.

Detection Methods for CVE-2022-29799

Indicators of Compromise

  • Unusual D-Bus messages targeting the networkd-dispatcher service with suspicious state values containing ../ sequences
  • Unexpected file access patterns in directories outside /etc/networkd-dispatcher
  • Anomalous process execution by networkd-dispatcher accessing files in non-standard locations
  • System logs showing path traversal patterns in networkd-dispatcher related entries

Detection Strategies

  • Monitor D-Bus traffic for messages to networkd-dispatcher containing path traversal sequences
  • Implement file integrity monitoring on critical system directories to detect unauthorized access
  • Deploy endpoint detection solutions capable of identifying privilege escalation attempts on Linux systems
  • Review system logs for networkd-dispatcher activity indicating directory traversal attempts

Monitoring Recommendations

  • Enable detailed logging for networkd-dispatcher and D-Bus services
  • Configure security monitoring tools to alert on path traversal patterns in process arguments
  • Monitor for unexpected script executions by the networkd-dispatcher service
  • Implement auditd rules to track file access outside expected networkd-dispatcher directories

How to Mitigate CVE-2022-29799

Immediate Actions Required

  • Update networkd-dispatcher to the latest patched version available from your Linux distribution
  • Review systems running Microsoft Defender for Endpoint on Linux and apply relevant updates
  • Consider disabling networkd-dispatcher if not required in your environment
  • Restrict D-Bus access to the networkd-dispatcher service where possible

Patch Information

Microsoft documented this vulnerability as part of the Nimbuspwn research. Organizations should apply security updates from their Linux distribution vendors that address CVE-2022-29799. The vulnerability has been addressed in updated versions of networkd-dispatcher. Refer to the Microsoft security blog post for detailed information on the vulnerability discovery and recommended mitigations.

Workarounds

  • Disable the networkd-dispatcher service if it is not required for your network management needs
  • Implement AppArmor or SELinux policies to restrict networkd-dispatcher file access to the intended directory
  • Restrict D-Bus communication with the networkd-dispatcher service to authorized system components only
  • Monitor and audit all networkd-dispatcher activity until patches can be applied
bash
# Disable networkd-dispatcher if not needed
sudo systemctl stop networkd-dispatcher
sudo systemctl disable networkd-dispatcher

# Verify the service is disabled
sudo systemctl status networkd-dispatcher

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechWindows

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.65%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Vendor Resources
  • Microsoft Blog Post on Nimbuspwn
  • Related CVEs
  • CVE-2026-21249: Windows 10 1607 Path Traversal Flaw

  • CVE-2026-23889: Pnpm Path Traversal Vulnerability

  • CVE-2026-20925: Windows NTLM Path Traversal Vulnerability

  • CVE-2026-20872: Windows NTLM Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English