CVE-2022-41082
HIGHCVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
Microsoft Exchange Server Remote Code Execution Vulnerability
Analysis
Microsoft Exchange Server allows authenticated remote code execution through PowerShell deserialization, the second component of 'ProxyNotShell' enabling SYSTEM-level command execution when chained with CVE-2022-41040.
Technical Context
The CWE-502 deserialization flaw in Exchange's PowerShell Remoting processes crafted serialized objects that execute arbitrary commands. When accessed through the ProxyNotShell SSRF, unauthenticated-equivalent RCE is achieved (only mailbox credentials needed).
Affected Products
['Microsoft Exchange Server 2013/2016/2019']
Remediation
Apply Microsoft security updates urgently. Monitor for unusual PowerShell execution on Exchange servers. Consider migrating to Exchange Online to eliminate on-premises Exchange attack surface.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today