#VU69096 Spoofing attack in Microsoft Exchange Server - CVE-2022-41079


| Updated: 2022-11-23

Vulnerability identifier: #VU69096

Vulnerability risk: Medium

CVSSv4.0: 6 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-41079

CWE-ID: CWE-451

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Microsoft Exchange Server
Server applications / Mail servers

Vendor: Microsoft

Description

The vulnerability allows a remote user to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data within the SerializationTypeConverter class. A remote user can perform spoofing attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 2 15.00.0712.024 - 2013 CU23 Oct22SU 15.00.1497.042, 2016 Cumulative Update 1 15.01.0396.030 - 2016 CU23 Oct22SU 15.01.2507.013, 2019 Cumulative Update 1 15.02.0330.005 - 2019 RTM 15.02.0221.012


External links
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41079
https://www.zerodayinitiative.com/advisories/ZDI-22-1604/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability