CVE-2022-41040

HIGH
2022-10-03 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:19 vuln.today
Added to CISA KEV
Oct 30, 2025 - 19:36 cisa
CISA KEV
PoC Detected
Oct 30, 2025 - 19:36 vuln.today
Public exploit code
Patch Released
Oct 30, 2025 - 19:36 nvd
Patch available
CVE Published
Oct 03, 2022 - 01:15 nvd
HIGH 8.8

Description

Microsoft Exchange Server Elevation of Privilege Vulnerability

Analysis

Microsoft Exchange Server contains an SSRF vulnerability known as 'ProxyNotShell' that allows authenticated attackers to access backend Exchange services, chained with CVE-2022-41082 for remote code execution.

Technical Context

The CWE-918 SSRF exploits Exchange's Client Access proxy to access the PowerShell backend, similar to ProxyShell but requiring valid credentials. The vulnerability allows an authenticated mailbox user to forge requests to internal Exchange services.

Affected Products

['Microsoft Exchange Server 2013/2016/2019']

Remediation

Apply Microsoft security updates. Implement URL rewrite rules as a temporary mitigation. Restrict Exchange PowerShell access. Enable MFA for all Exchange accounts.

Priority Score

218
Low Medium High Critical
KEV: +50
EPSS: +94.1
CVSS: +44
POC: +20

Share

CVE-2022-41040 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy