CISA mandates agencies to patch two privilege escalation flaws

January 11, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) gave all Federal Civilian Executive Branch Agencies (FCEB) three weeks until January 31st to address two security flaws and block potential attacks.

The two flaws include a Microsoft Exchange elevation of privileges flaw tracked as CVE-2022-41080 and a privilege escalation zero-day tracked as CVE-2023-21674.

CVE-2022-41080 can be paired with a ProxyNotShell bug tracked as CVE-2022-41082 to gain remote code execution. Already, Play ransomware attackers are exploiting the flaw as a zero-day to bypass Microsoft’s ProxyNotShell URL rewrite mitigations and escalate permissions on compromised Exchange servers.

Since the exploit used in the attack has already been publicly provided, more attackers are attempting to exploit the flaw. Organizations with on-premises Microsoft Exchange servers are therefore advised to deploy the latest Exchange security updates immediately or disable Outlook Web Access (OWA) until they can apply CVE-2022-41080 patches.

The second flaw (CVE-2023-21674), a privilege escalation zero-day in the Windows Advanced Local Procedure Call (ALPC) is also being exploited by attackers.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn