Multiple vulnerabilities in Microsoft Exchange



Published: 2020-12-08
Risk Medium
Patch available YES
Number of vulnerabilities 6
CVE ID CVE-2020-17144
CVE-2020-17143
CVE-2020-17142
CVE-2020-17141
CVE-2020-17132
CVE-2020-17117
CWE ID CWE-20
CWE-200
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #4 is available.
Vulnerable software
Subscribe
Microsoft Exchange Server
Server applications / Mail servers

Vendor Microsoft

Security Advisory

1) Input validation error

Risk: Medium

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17144

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: Yes

Description

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input when processing cmdlet argument. A remote privileged user can pass specially crafted input to the exchange server and  execute arbitrary code.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2010, 2010 Service Pack 1, 2010 Service Pack 1 Update Rollup 1, 2010 Service Pack 1 Update Rollup 2, 2010 Service Pack 1 Update Rollup 3, 2010 Service Pack 1 Update Rollup 4, 2010 Service Pack 1 Update Rollup 5, 2010 Service Pack 1 Update Rollup 6, 2010 Service Pack 1 Update Rollup 7, 2010 Service Pack 1 Update Rollup 8, 2010 Service Pack 2, 2010 Service Pack 2 Update Rollup 1, 2010 Service Pack 2 Update Rollup 2, 2010 Service Pack 2 Update Rollup 3, 2010 Service Pack 2 Update Rollup 4, 2010 Service Pack 2 Update Rollup 5, 2010 Service Pack 2 Update Rollup 6, 2010 Service Pack 2 Update Rollup 7, 2010 Service Pack 2 Update Rollup 8, 2010 Service Pack 3, 2010 Service Pack 3 Update Rollup 1, 2010 Service Pack 3 Update Rollup 2, 2010 Service Pack 3 Update Rollup 3, 2010 Service Pack 3 Update Rollup 4, 2010 Service Pack 3 Update Rollup 5, 2010 Service Pack 3 Update Rollup 6, 2010 Service Pack 3 Update Rollup 7, 2010 Service Pack 3 Update Rollup 8, 2010 Service Pack 3 Update Rollup 9, 2010 Service Pack 3 Update Rollup 10, 2010 Service Pack 3 Update Rollup 11, 2010 Service Pack 3 Update Rollup 12, 2010 Service Pack 3 Update Rollup 13, 2010 Service Pack 3 Update Rollup 14, 2010 Service Pack 3 Update Rollup 15, 2010 Service Pack 3 Update Rollup 16, 2010 Service Pack 3 Update Rollup 17, 2010 Service Pack 3 Update Rollup 18, 2010 Service Pack 3 Update Rollup 19, 2010 Service Pack 3 Update Rollup 20, 2010 Service Pack 3 Update Rollup 21, 2010 Service Pack 3 Update Rollup 22, 2010 Service Pack 3 Update Rollup 23, 2010 Service Pack 3 Update Rollup 24, 2010 Service Pack 3 Update Rollup 25, 2010 Service Pack 3 Update Rollup 26, 2010 Service Pack 3 Update Rollup 27, 2010 Service Pack 3 Update Rollup 28, 2010 Service Pack 3 Update Rollup 29, 2010 Service Pack 3 Update Rollup 30, 2010 Update Rollup 1, 2010 Update Rollup 2, 2010 Update Rollup 3, 2010 Update Rollup 4, 2010 Update Rollup 5

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17144

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17143

CWE-ID: CWE-200 - Information Exposure

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in Microsoft Exchange. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 23, 2016 Cumulative Update 17, 2016 Cumulative Update 18, 2019 Cumulative Update 6, 2019 Cumulative Update 7

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17143

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17142

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 23, 2016 Cumulative Update 17, 2016 Cumulative Update 18, 2019 Cumulative Update 6, 2019 Cumulative Update 7

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17142

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17141

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: Yes

Description

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2016 Cumulative Update 17, 2016 Cumulative Update 18, 2019 Cumulative Update 6, 2019 Cumulative Update 7

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17141

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17132

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 23, 2016 Cumulative Update 17, 2016 Cumulative Update 18, 2019 Cumulative Update 6, 2019 Cumulative Update 7

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17132

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-17117

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in Microsoft Exchange. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Microsoft Exchange Server: 2013 Cumulative Update 23, 2016 Cumulative Update 17, 2016 Cumulative Update 18, 2019 Cumulative Update 6, 2019 Cumulative Update 7

CPE External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17117

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###