CVE-2022-33633: Skype for Business and Lync Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 7.2)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2022-Jul
- Released
- 2022-07-12
- EPSS Score
- 6.30% (percentile: 91.0%)
FAQ
According to the CVSS metric, privileges required is high (PR:H). What privileges are needed by the attacker and how are they used in the context of the remote code execution?
To successfully exploit this vulnerability, the attacker must have write access on the file share, and an active file share administrator account on the target
server. With write access, the attacker would need to modify specific files on the target server to trigger code execution.
Affected Products (3)
Microsoft Office
- Microsoft Lync Server 2013 CU10
- Skype for Business Server 2015 CU12
- Skype for Business Server 2019 CU6
Security Updates (3)
Acknowledgments
Yiming Xiang with <a href="https://www.nsfocus.cn/">NSFOCUS TIANJI LAB</a>
Revision History
- 2022-07-12: Information published.