Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-21709

Опубликовано: 09 авг. 2023
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

Microsoft Exchange Server Elevation of Privilege Vulnerability

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would be able to login as another user successfully.

How could an attacker exploit this vulnerability?

In a network-based attack, an attacker could brute force user account passwords to log in as that user. Microsoft encourages the use of strong passwords that are more difficult for an attacker to brute force.

Why is the severity for this CVE rated as Important, but the CVSS score is 9.8?

The Microsoft proprietary severity rating does not align with the CVSS scoring system. In this case, the severity rating of Important (rather than Critical) reflects the fact that brute-force attacks are unlikely to succeed against users with strong passwords. The CVSS scoring system doesn't allow for this type of nuance.

Update October 10-10-2023

Is there new information available regarding this CVE?

Yes, CVE-2023-36434 which was published October 10, 2023 addresses a vulnerability in Windows IIS that completely mitigates this Exchange vulnerability. If you have applied the additional steps documented in the following FAQ, please read the Exchange Blog for details on what to do now regarding this vulnerability as well as what to do for the new Windows IIS vulnerability.

Are there additional steps needed to protect against this vulnerability?

Yes, in addition to installing the updates a script must be run. Alternatively you can accomplish the same by running commands from the command line in a PowerShell window or some other terminal.

Follow the following steps:

  1. (Strongly recommended) Install Exchange Server 2016 or 2019 August SU (or later)
  2. Do one of the following:
  • Apply the solution for the CVE automatically on your servers, run the CVE-2023-21709.ps1 script. You can find the script and the documentation here: https://aka.ms/CVE-2023-21709ScriptDoc.

or

  • Apply the solution for the CVE manually on each server, by running the following command from an elevated PowerShell window:

Clear-WebConfiguration -Filter "/system.webServer/globalModules/add[@name='TokenCacheModule']" -PSPath "IIS:\"

  1. To roll-back the solution for the CVE manually on each server, run the following:

New-WebGlobalModule -Name "TokenCacheModule" -Image "%windir%\System32\inetsrv\cachtokn.dll"

Although Microsoft recommends installing the security updates as soon as possible, running the script or the commands on a supported version of Exchange Server prior to installing the updates will address this vulnerability.

Is there anything that I should be aware of if I'm running a non-English operating system and version of Exchange server?

Yes, an issue has been discovered with the non-English August updates of Exchange Server and you should postpone installing these updates. The script protecting customers from the vulnerability documented by CVE-2023-21709 can be run to protect against the vulnerability without installing the August updates. Microsoft recommends running the script.

August 15, 2023 Update: The known issue affecting the non-English August updates of Exchange Server has been resolved. Microsoft recommends installing the updated packages as soon as possible.

Please see the Exchange Blog for more information.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2019 Cumulative Update 12
Microsoft Exchange Server 2016 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 13

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 87%
0.03581
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 2 года назад

Microsoft Exchange Server Elevation of Privilege Vulnerability

CVSS3: 9.8
github
почти 2 года назад

Microsoft Exchange Server Elevation of Privilege Vulnerability

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
msrc
почти 2 года назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 8
msrc
почти 2 года назад

Microsoft Exchange Server Remote Code Execution Vulnerability

EPSS

Процентиль: 87%
0.03581
Низкий

9.8 Critical

CVSS3