#VU69093 Spoofing attack in Microsoft Exchange Server


Published: 2022-11-08 | Updated: 2022-11-23

Vulnerability identifier: #VU69093

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-41078

CWE-ID: CWE-451

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Microsoft Exchange Server
Server applications / Mail servers

Vendor: Microsoft

Description

The vulnerability allows a remote user to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data within the ApprovedApplication class. A remote user can perform spoofing attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002 - 2013 CU23 Oct22SU 15.00.1497.042, 2016 Cumulative Update 22 15.01.2375.007 - 2016 CU23 Oct22SU 15.01.2507.013, 2019 Preview 15.02.0196.000 - 2019 CU12 Oct22SU 15.02.1118.015


External links
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41078
http://www.zerodayinitiative.com/advisories/ZDI-22-1601/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability