Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2019-1373

Опубликовано: 12 нояб. 2019
Источник: msrc
EPSS Средний

Описание

Microsoft Exchange Remote Code Execution Vulnerability

A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the logged in user.

Exploitation of this vulnerability requires that a user run cmdlets via PowerShell.

The security update addresses the vulnerability by correcting how Exchange serializes its metadata.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2019 Cumulative Update 2
Microsoft Exchange Server 2016 Cumulative Update 13
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 3
Microsoft Exchange Server 2016 Cumulative Update 14

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

EPSS

Процентиль: 94%
0.12497
Средний

Связанные уязвимости

CVSS3: 9.8
nvd
почти 6 лет назад

A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'.

github
около 3 лет назад

A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'.

CVSS3: 9.8
fstec
почти 6 лет назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
msrc
больше 4 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 7.8
msrc
больше 4 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability

EPSS

Процентиль: 94%
0.12497
Средний