CISA mandates agencies to patch two privilege escalation flaws

January 11, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) gave all Federal Civilian Executive Branch Agencies (FCEB) three weeks until January 31st to address two security flaws and block potential attacks.

The two flaws include a Microsoft Exchange elevation of privileges flaw tracked as CVE-2022-41080 and a privilege escalation zero-day tracked as CVE-2023-21674.

CVE-2022-41080 can be paired with a ProxyNotShell bug tracked as CVE-2022-41082 to gain remote code execution. Already, Play ransomware attackers are exploiting the flaw as a zero-day to bypass Microsoft’s ProxyNotShell URL rewrite mitigations and escalate permissions on compromised Exchange servers.

Since the exploit used in the attack has already been publicly provided, more attackers are attempting to exploit the flaw. Organizations with on-premises Microsoft Exchange servers are therefore advised to deploy the latest Exchange security updates immediately or disable Outlook Web Access (OWA) until they can apply CVE-2022-41080 patches.

The second flaw (CVE-2023-21674), a privilege escalation zero-day in the Windows Advanced Local Procedure Call (ALPC) is also being exploited by attackers.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn