Microsoft Patches Critical Exchange Server Flaw - Hexafusion Blog | Hexafusion

Hexafusion Blog

Microsoft Patches Critical Exchange Server Flaw

Microsoft today issued security updates for 71 software vulnerabilities, three of which were critical and one that has a known proof-of-concept available in the public domain.

Among the most notable flaws fixed today by Microsoft are:

CVE-2022-23277 Microsoft Exchange Server Remote Code Execution Vulnerability
This is a critical bug that could allow an attacker who has been authenticated to the server run malicious code.

CVE-2022-21990 Remote Desktop Client Remote Code Execution Vulnerability
This one — while ranked "important" and not critical — has the known PoC, so security experts recommend prioritizing it. The vuln allows an attacker who controls a Remote Desktop Server connection to remotely execute code on the victim client RDP machine.

CVE-2022-24508 Windows SMBv3 Client/Server Remote Code Execution Vulnerability
This one requires an attacker to be authenticated, and it affects both client and server Windows 10 systems. ZDI's Dustin Childs recommends prioritizing this patch as well.

Original author: Dark Reading Staff, Dark Reading
List of Vulnerabilities MSSPs Need to Patch for U....
Even 'Perfect' APIs Can Be Abused

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 May 2022

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://hexafusion.com/

Customer Login

News & Updates

Hexafusion is proud to announce the launch of our new website at www.hexafusion.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Hexafusion can do for your business.

Hexafusion
250 - 997 Seymour Street
Vancouver, British Columbia V6B 3M1