Vulnerability Name: | CVE-2022-41082 (CCN-237549) | ||||||||||||
Assigned: | 2022-09-29 | ||||||||||||
Published: | 2022-09-29 | ||||||||||||
Updated: | 2023-03-02 | ||||||||||||
Summary: | Microsoft Exchange Server could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw when PowerShell is accessible. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-41082 Source: secure@microsoft.com Type: Exploit, Third Party Advisory, VDB Entry secure@microsoft.com Source: CCN Type: US-CERT VU#915563 Microsoft Exchange 2019 Cumulative Update 23 and earlier versions are vulnerable to a server-side request forgery (SSRF) attack and remote code execution. An authenticated attacker can use the combination of these two vulnerabilities to elevate privileges and execute arbitrary code on the target Exchange server. Source: XF Type: UNKNOWN ms-exchange-cve202241082-code-exec(237549) Source: CCN Type: Microsoft Security Response Center Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server Source: secure@microsoft.com Type: Patch, Vendor Advisory secure@microsoft.com Source: secure@microsoft.com Type: Third Party Advisory, US Government Resource secure@microsoft.com Source: secure@microsoft.com Type: UNKNOWN secure@microsoft.com | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |