CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
95.7%
Microsoft Exchange Server Remote Code Execution Vulnerability
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | exchange_server | 2013 | cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* |
microsoft | exchange_server | 2016 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:* |
microsoft | exchange_server | 2016 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:* |
microsoft | exchange_server | 2019 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:* |
microsoft | exchange_server | 2019 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:* |
packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41082
www.kb.cert.org/vuls/id/915563
www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/