cnvd-2023-02192
Vulnerability from cnvd
Title
Microsoft Skype for Business和Lync欺骗漏洞
Description
Microsoft Skype for Business Server是美国微软(Microsoft)公司的一套安全统一的通信平台,它提供即时消息 (IM)、音频和视频通话、联机会议、联机状态信息和共享功能。 Microsoft Skype for Business和Lync存在欺骗漏洞,攻击者可利用该漏洞进行欺骗攻击。
Severity
Patch Name
Microsoft Skype for Business和Lync欺骗漏洞的补丁
Patch Description
Microsoft Skype for Business Server是美国微软(Microsoft)公司的一套安全统一的通信平台,它提供即时消息 (IM)、音频和视频通话、联机会议、联机状态信息和共享功能。 Microsoft Skype for Business和Lync存在欺骗漏洞,攻击者可利用该漏洞进行欺骗攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26910

Reference
https://nvd.nist.gov/vuln/detail/CVE-2022-26910
Impacted products
Name
['Microsoft Skype for Business Server 2015 CU12', 'Microsoft Skype for Business Server 2019 CU6', 'Microsoft Skype for Lync Server 2013 CU10']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-26910",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-26910"
    }
  },
  "description": "Microsoft Skype for Business Server\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u5957\u5b89\u5168\u7edf\u4e00\u7684\u901a\u4fe1\u5e73\u53f0\uff0c\u5b83\u63d0\u4f9b\u5373\u65f6\u6d88\u606f (IM)\u3001\u97f3\u9891\u548c\u89c6\u9891\u901a\u8bdd\u3001\u8054\u673a\u4f1a\u8bae\u3001\u8054\u673a\u72b6\u6001\u4fe1\u606f\u548c\u5171\u4eab\u529f\u80fd\u3002\n\nMicrosoft Skype for Business\u548cLync\u5b58\u5728\u6b3a\u9a97\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u6b3a\u9a97\u653b\u51fb\u3002",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26910",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2023-02192",
  "openTime": "2023-01-10",
  "patchDescription": "Microsoft Skype for Business Server\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u5957\u5b89\u5168\u7edf\u4e00\u7684\u901a\u4fe1\u5e73\u53f0\uff0c\u5b83\u63d0\u4f9b\u5373\u65f6\u6d88\u606f (IM)\u3001\u97f3\u9891\u548c\u89c6\u9891\u901a\u8bdd\u3001\u8054\u673a\u4f1a\u8bae\u3001\u8054\u673a\u72b6\u6001\u4fe1\u606f\u548c\u5171\u4eab\u529f\u80fd\u3002\r\n\r\nMicrosoft Skype for Business\u548cLync\u5b58\u5728\u6b3a\u9a97\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u6b3a\u9a97\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Microsoft Skype for Business\u548cLync\u6b3a\u9a97\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Microsoft Skype for Business Server 2015 CU12",
      "Microsoft Skype for Business Server 2019 CU6",
      "Microsoft Skype for Lync Server 2013 CU10"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-26910",
  "serverity": "\u4e2d",
  "submitTime": "2022-04-15",
  "title": "Microsoft Skype for Business\u548cLync\u6b3a\u9a97\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…