CVE-2022-23292: Microsoft Power BI Spoofing Vulnerability

Overview

Severity
Low (CVSS 3.7)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Apr
Released
2022-04-12
Last Updated
2023-04-14
EPSS Score
0.83% (percentile: 74.6%)

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attack requires that multiple users try to use the gateway at the same time. According to the CVSS, Scope is Changed. What is meant by scope change for this particular vulnerability? A leaking impersonation session can lead to spoofing of another user account. An attacker with.... privileges could access the data of another tenant. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability? Information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Affected Products (1)

SQL Server

  • Microsoft On-Premises Data Gateway

Security Updates (1)

Revision History

  • 2022-04-12: Information published.
  • 2023-04-14: Updated one or more CVSS scores for the affected products and added an FAQ explaining the vector string settings. This is an informational change only.