Spoofing attack in Microsoft Skype for Business and Lync



Published: 2022-04-13
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-26910
CWE-ID CWE-451
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Skype for Business Server
Server applications / Conferencing, Collaboration and VoIP solutions

Vendor Microsoft

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Spoofing attack

EUVDB-ID: #VU62279

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26910

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data in Skype for Business and Lync. A remote attacker can make a specially crafted network call to the target Skype for Business server and disclose IP addresses or port numbers.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Skype for Business Server: 2015 CU12 - 2019 CU6

External links

http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26910


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###