Cythera Cyber Security

Microsoft Exchange On-Prem Critical Vulnerabilities - CVE-2022-41080, CVE-2022-41082

Attackers are using SSRF vulnerability CVE-2022-41040 to target the backend PowerShell service through Outlook Web Access. Once the PowerShell service has been reached, vulnerability CVE-2022-41082 is exploited.
Talk to an expert

CVE: CVE-2022-41080, CVE-2022-41082

What Is Vulnerable?

Microsoft Exchange Server (On-Premises) 2013, 2016, 2019 devices that have not applied update KB5019758 released on November 8.

What’s Happening?

There has been an increase of attacks against On-Prem Exchange Servers that are utilising Microsofts URL Rewrite mitigiations as a defence against CVE-2022-41080 and CVE-2022-41082.


Threat actors are chaining vulnerabilities CVE-2022-41080 and CVE-2022-41082 to infiltrate networks and deploy ransomware.

Key Facts

Attackers are using SSRF vulnerability CVE-2022-41040 to target the backend PowerShell service through Outlook Web Access.
Once the PowerShell service has been reached, vulnerability CVE-2022-41082 is exploited to execute arbitrary commands on the device.

What You Can Do

System Administrators are advised to:

  • Immediately apply update KB5019758 to On-Prem Microsoft Exchange Servers which remediates these issues.
  • Inspect their systems for PowerShell sessions spawned by IIS creating outbound connections including to the following IPs: 45.76.141[.]84, 45.76.143[.]143

Detections rules that have been associated with this attack vector:

  • Attacker Technique - PowerShell Registry Cradle
  • Suspicious Process - PowerShell System.Net.Sockets.TcpClient
  • Suspicious Process - Exchange Server Spawns Process
  • PowerShell - Obfuscated Script
  • Webshell - IIS Spawns PowerShel

Additional follow-on detection behaviours observed with this type of compromise include:

  • Attacker Technique - Plink Redirecting RDP
  • Attacker Technique - Renamed Plink
  • Suspicious Process - Started From Users Music Directory

Further information on the vulnerability is available Microsoft, Rapid7, CrowdStrike

Cythera Vulnerability Management Clients are actively being scanned for any vulnerable instances of Microsoft Exchange.


Events

Latest events

Join Cythera experts for networking events, technical briefings, and hands-on workshops hosted throughout the year.
View all events
No items found.
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
Silverstripe - Host Header Injection
Silverstripe CMS is affected by a Host Header Injection flaw, which can be exploited to manipulate password reset workflows, potentially redirecting or compromising user data.
FarCry Core Framework - Multiple Issues
FarCry Core contains multiple vulnerabilities that could let unauthenticated users upload arbitrary files and execute remote code on the hosting server.
Silverstripe – Cross-Site Scripting (XSS) Vulnerability
With local organisation admin credentials, an attacker can exploit the API to create, delete, or revert virtual machine snapshots in other organisations’ Virtual Data Centres (VDCs), breaching isolation boundaries.