#VU67764 Deserialization of Untrusted Data in Microsoft Exchange Server - CVE-2022-41082
Published: September 30, 2022 / Updated: January 14, 2023
Vulnerability identifier: #VU67764
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2022-41082
CWE-ID: CWE-502
Exploitation vector: Remote access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
Microsoft Exchange Server
Microsoft Exchange Server
Software vendor:
Microsoft
Microsoft
Description
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data. A remote user with access to PowerShell Remoting on vulnerable Exchange systems can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
External links
- https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
- https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41082
- https://www.zerodayinitiative.com/advisories/ZDI-22-1442/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1624/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1654/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1653/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1652/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1651/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1650/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1649/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1648/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1647/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1646/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1645/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1644/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1643/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1642/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1641/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1640/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1639/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1638/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1637/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1636/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1635/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1634/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1633/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1632/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1631/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1630/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1629/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1628/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1627/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1626/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1625/