Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-33633

Опубликовано: 12 июл. 2022
Источник: msrc
CVSS3: 7.2
EPSS Низкий

Описание

Skype for Business and Lync Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, privileges required is high (PR:H). What privileges are needed by the attacker and how are they used in the context of the remote code execution?

To successfully exploit this vulnerability, the attacker must have write access on the file share, and an active file share administrator account on the target server. With write access, the attacker would need to modify specific files on the target server to trigger code execution.

Обновления

ПродуктСтатьяОбновление
Microsoft Lync Server 2013 CU10
Skype for Business Server 2015 CU12
Skype for Business Server 2019 CU6

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 91%
0.06301
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
nvd
больше 3 лет назад

Skype for Business and Lync Remote Code Execution Vulnerability

CVSS3: 7.2
github
больше 3 лет назад

Skype for Business and Lync Remote Code Execution Vulnerability.

CVSS3: 7.2
fstec
больше 3 лет назад

Уязвимость сервера корпоративных коммуникаций Skype for Business Server и Microsoft Lync Server, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 91%
0.06301
Низкий

7.2 High

CVSS3