Risk | High |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2021-31196 CVE-2021-34470 CVE-2021-33768 CVE-2021-34473 CVE-2021-34523 CVE-2021-31206 |
CWE-ID | CWE-94 CWE-264 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #1 is available. Vulnerability #4 is being exploited in the wild. Vulnerability #5 is being exploited in the wild. |
Vulnerable software Subscribe |
Microsoft Exchange Server Server applications / Mail servers |
Vendor | Microsoft |
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU54702
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-31196
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Exchange Server. A remote administrator can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31196
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54712
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-34470
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Microsoft Exchange Server. A remote authenticated attacker on the local network can gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002, 2016 Cumulative Update 21 15.01.2308.008, 2019 Cumulative Update 10 15.02.0922.007
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34470
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54709
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-33768
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Microsoft Exchange Server. A remote authenticated attacker on the local network can gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Exchange Server: 2016 Cumulative Update 20 15.01.2242.004 - 2016 Cumulative Update 21 15.01.2308.008, 2019 Cumulative Update 9 15.02.0858.005 - 2019 Cumulative Update 10 15.02.0922.007
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33768
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54705
Risk: High
CVSSv3.1:
CVE-ID: CVE-2021-34473
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Exchange Server. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34473
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54704
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-34523
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a remote local to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Microsoft Exchange Server, which leads to security restrictions bypass and privilege escalation.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34523
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54703
Risk: High
CVSSv3.1:
CVE-ID: CVE-2021-31206
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Exchange Server. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMicrosoft Exchange Server: 2013 Cumulative Update 23 15.00.1497.002
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31206
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?