CVE-2022-24472: Microsoft SharePoint Server Spoofing Vulnerability

Overview

Severity
High (CVSS 8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Apr
Released
2022-04-12
EPSS Score
6.96% (percentile: 91.4%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or website, but would have to convince them to visit the server share or website, typically by way of an enticement in an email or chat message. How could an attacker exploit this vulnerability? A standard user who has been authenticated in the domain could potentially use this vulnerability to send malicious content in SIP Address field which would allow the user to have access to content that is not authorized.

Affected Products (5)

Microsoft Office

  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition
  • Microsoft SharePoint Server 2016
  • Microsoft SharePoint Foundation 2013 Service Pack 1

Security Updates (4)

Acknowledgments

satanon with NCSC

Revision History

  • 2022-04-12: Information published.