#VU69093 Spoofing attack in Microsoft Exchange Server - CVE-2022-41078


| Updated: 2022-11-23

Vulnerability identifier: #VU69093

Vulnerability risk: Medium

CVSSv4.0: 6 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-41078

CWE-ID: CWE-451

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Microsoft Exchange Server
Server applications / Mail servers

Vendor: Microsoft

Description

The vulnerability allows a remote user to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data within the ApprovedApplication class. A remote user can perform spoofing attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002 - 2013 CU23 Oct22SU 15.00.1497.042, 2016 Cumulative Update 22 15.01.2375.007 - 2016 CU23 Oct22SU 15.01.2507.013, 2019 Cumulative Update 1 15.02.0330.005 - 2019 RTM 15.02.0221.012


External links
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41078
https://www.zerodayinitiative.com/advisories/ZDI-22-1601/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability