CVE-2022-33633

7.2 HIGH

📋 TL;DR

CVE-2022-33633 is a remote code execution vulnerability in Skype for Business and Lync that allows an attacker to execute arbitrary code on affected systems. Attackers can exploit this vulnerability by sending specially crafted requests to vulnerable servers. Organizations running Skype for Business or Lync servers are affected.

💻 Affected Systems

Products:
  • Skype for Business Server
  • Lync Server
Versions: Skype for Business Server 2015, 2019; Lync Server 2013
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: All supported versions of Skype for Business Server and Lync Server are affected when running default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install programs, view/change/delete data, or create new accounts with full user rights on the affected server.

🟠

Likely Case

Attacker gains control of the Skype for Business/Lync server, potentially accessing sensitive communications data and using the server as a foothold for lateral movement.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to the isolated server environment.

🌐 Internet-Facing: HIGH - If Skype for Business/Lync servers are exposed to the internet, they are directly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or those who have gained network access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has rated this as 'Exploitation More Likely' in their security advisory. The vulnerability requires no authentication to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2022 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33633

Restart Required: Yes

Instructions:

1. Download the July 2022 security updates for Skype for Business Server or Lync Server from Microsoft Update Catalog. 2. Apply the updates to all affected servers. 3. Restart the servers as required.

🔧 Temporary Workarounds

Block external access

all

Restrict network access to Skype for Business/Lync servers to trusted internal networks only

Use firewall rules to block inbound traffic to ports 5061, 444, 443 from untrusted networks

Network segmentation

all

Isolate Skype for Business/Lync servers in a separate network segment

🧯 If You Can't Patch

  • Immediately isolate affected servers from internet access and restrict to internal trusted networks only
  • Implement strict network monitoring and anomaly detection for traffic to Skype for Business/Lync servers

🔍 How to Verify

Check if Vulnerable:

Check if Skype for Business Server or Lync Server is installed and if July 2022 security updates are not applied

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Skype for Business*' -or $_.Name -like '*Lync*'} | Select-Object Name, Version

Verify Fix Applied:

Verify that July 2022 security updates are installed and server version shows updated build numbers

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication failures
  • Abnormal process creation on Skype for Business servers
  • Suspicious PowerShell or command execution

Network Indicators:

  • Unusual traffic patterns to Skype for Business/Lync ports (5061, 444, 443)
  • Malformed requests to Skype for Business services

SIEM Query:

source="SkypeForBusiness" AND (event_id=300 OR event_id=301) AND (process_name="powershell.exe" OR process_name="cmd.exe")

🔗 References

📤 Share & Export