Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-21978

Опубликовано: 10 мая 2022
Источник: msrc
CVSS3: 8.2
EPSS Низкий

Описание

Microsoft Exchange Server Elevation of Privilege Vulnerability

FAQ

Do I need to take further steps to be protected from this vulnerability?

Because of additional security hardening work for CVE-2022-21978, the following actions should be taken in addition to application of May 2022 security updates:

For customers that have Exchange Server 2016 CU22 or CU23, or Exchange Server 2019 CU11 or CU12 installed

Install the May 2022 SU first and then run one of the following commands using Setup.exe in your Exchange Server installation path (e.g., …\Program Files\Microsoft\Exchange Server\v15\Bin):

  • Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataON /PrepareAllDomains

  • Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataOFF /PrepareAllDomains

For customers that have Exchange Server 2013 CU23 installed:

Install the May 2022 SU first and then run the following command using Setup.exe in your Exchange Server installation path (e.g., …\Program Files\Microsoft\Exchange Server\v15\Bin):

  • Setup.exe /IAcceptExchangeServerLicenseTerms /PrepareAllDomains

For customers that have any older version of Exchange Server not listed above:

Update your Exchange server to the latest CU, install May 2022 SU and then follow the steps above.

NOTE: You need to run /PrepareAllDomains only once per organization and those changes will apply to all versions of Exchange Server within the organization. When you run /PrepareAllDomains, your account needs to be a member of the Enterprise Admins security group. This might be a different account from the one you use to install the SU.

Please see New Exchange Server Security Update and Hotfix Packaging for more information

According to the CVSS metric, privileges required is high (PR:H). What privileges does an attacker require to exploit this vulnerability?

Successful exploitation of this vulnerability requires the attacker to be authenticated to the Exchange Server as a member of a high privileged group.

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, an attacker with elevated privileges on the Exchange server could gain the rights of a Domain Administrator. This could allow access and controls outside of the expected scope of the targeted functionality.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Exchange Server 2019 Cumulative Update 12
Microsoft Exchange Server 2016 Cumulative Update 23

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

EPSS

Процентиль: 66%
0.00524
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
больше 3 лет назад

Microsoft Exchange Server Elevation of Privilege Vulnerability

CVSS3: 8.2
github
больше 3 лет назад

Microsoft Exchange Server Elevation of Privilege Vulnerability.

CVSS3: 8.2
fstec
около 4 лет назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 66%
0.00524
Низкий

8.2 High

CVSS3