Microsoft Exchange Server Remote Code Execution Vulnerability
Published: 2022-09-30
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available.
https://www.kb.cert.org/vuls/id/915563
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41082
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.mandiant.com/resources/blog/zero-days-exploited-2022
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.tenable.com/blog/microsofts-feb-2024-patch-tuesday-cve-2024-21351-cve-2024-21412
https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities
https://www.tenable.com/blog/microsofts-february-2023-patch-tuesday-addresses-75-cves-cve-2023-23376
https://www.tenable.com/blog/microsofts-october-2022-patch-tuesday-addresses-84-cves-cve-2022-41033
Published: 2022-10-03
Updated: 2025-04-03
Named Vulnerability: ProxyNotShellKnown Exploited Vulnerability (KEV)
Base Score: 7.7
Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8
Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.92262