Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-21969

Опубликовано: 11 янв. 2022
Источник: msrc
CVSS3: 9
EPSS Низкий

Описание

Microsoft Exchange Server Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good examples would include the same shared physical network (such as Bluetooth or IEEE 802.11), logical network (local IP subnet), or from within a secure or otherwise limited administrative domain (MPLS, secure VPN to an administrative network zone). This is common to many attacks that require machine-in-the-middle (MITM) type setups or that rely on initially gaining a foothold in another environment.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2019 Cumulative Update 11

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

Exploitation More Likely

EPSS

Процентиль: 84%
0.02088
Низкий

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 9
nvd
около 4 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 9
github
около 4 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21846, CVE-2022-21855.

CVSS3: 9
fstec
около 4 лет назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 84%
0.02088
Низкий

9 Critical

CVSS3