#VU69096 Spoofing attack in Microsoft Exchange Server


Published: 2022-11-08 | Updated: 2022-11-23

Vulnerability identifier: #VU69096

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-41079

CWE-ID: CWE-451

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Microsoft Exchange Server
Server applications / Mail servers

Vendor: Microsoft

Description

The vulnerability allows a remote user to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data within the SerializationTypeConverter class. A remote user can perform spoofing attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2016 Preview 15.01.0225.016 - 2016 CU23 Oct22SU 15.01.2507.013, 2013 RTM 15.00.0516.032 - 2013 CU23 Oct22SU 15.00.1497.042, 2019 Preview 15.02.0196.000 - 2019 CU12 Oct22SU 15.02.1118.015


External links
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41079
http://www.zerodayinitiative.com/advisories/ZDI-22-1604/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability