---
licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0)
licence_link: https://creativecommons.org/licenses/by/4.0/
licence_restrictions: https://cert.europa.eu/legal-notice
licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies
title: 'Critical Vulnerability in Microsoft Exchange Server'
version: '1.0'
number: '2022-015'
date: 'March 10, 2022'
---
_History:_
* _10/03/2022 --- v1.0 -- Initial publication_
# Summary
On March 8th, Microsoft issued the monthly Patch Tuesday where 71 vulnerabilities were fixed. Three of them were classified as **Critical** as they allow remote code execution (RCE) [1]. One of these critical vulnerabilities affects Microsoft Exchange Server.
The vulnerability tracked as CVE-2022-23277 is a remote code execution vulnerability that can be exploited by an authenticated attacker to perfom RCE on Microsoft Exchange [2]. No active exploitation of this vulnerability is known yet.
# Technical Details
There is not much detail available about how this vulnerability could be exploited. As per Microsoft, the attacker exploiting this vulnerability could target the server accounts for an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call [2].
# Affected Products
* Microsoft Exchange Server 2019 Cumulative Update 11
* Microsoft Exchange Server 2019 Cumulative Update 10
* Microsoft Exchange Server 2016 Cumulative Update 22
* Microsoft Exchange Server 2016 Cumulative Update 21
* Microsoft Exchange Server 2013 Cumulative Update 23
# Recommendations
Given the fact that we have observed increasing attacks against Microsoft Exchange, we strongly advise to apply the patch as soon as possible.
# References
[1]
[2]