SB2022110823 - Multiple vulnerabilities in Microsoft Exchange Server
Published: November 8, 2022 Updated: December 28, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-41080)
The vulnerability allows a remote user to escalate privileges.
The vulnerability exists due to application does not properly impose security restrictions. A remote authenticated user can escalate privileges within the Exchange server.
Note, this vulnerability is suspected to be used in a new exploit method bypasses URL rewrite mitigations for the Autodiscover endpoint provided by Microsoft in response to ProxyNotShell.
2) Spoofing attack (CVE-ID: CVE-2022-41079)
The vulnerability allows a remote user to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data within the SerializationTypeConverter class. A remote user can perform spoofing attack.3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-41123)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions. A local user can bypass implemented security restrictions and escalate privileges on the system.
4) Spoofing attack (CVE-ID: CVE-2022-41078)
The vulnerability allows a remote user to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data within the ApprovedApplication class. A remote user can perform spoofing attack.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41080
- https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41079
- https://www.zerodayinitiative.com/advisories/ZDI-22-1604/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41123
- https://www.zerodayinitiative.com/advisories/ZDI-22-1603/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1602/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41078
- https://www.zerodayinitiative.com/advisories/ZDI-22-1601/