Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-36439

Опубликовано: 14 нояб. 2023
Источник: msrc
CVSS3: 8
EPSS Низкий

Описание

Microsoft Exchange Server Remote Code Execution Vulnerability

FAQ

How could an attacker exploit this vulnerability?

For the vulnerability to be exploited, the attacker would need to be authenticated as a valid exchange user.

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An authenticated attacker could gain remote code execution rights on the server mailbox backend as NT AUTHORITY\SYSTEM.

According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.

Are there any more actions I need to take to be protected from this vulnerability?

Yes. Customers running an affected version of Microsoft Exchange need to download the November 2023 Security Update and ensure the Serialized Data Signing feature is enabled to be protected from this vulnerability. Disabling certificate signing of Powershell serialization payloads makes your server vulnerable to known Exchange vulnerabilities and weakens protection against unknown threats. We recommend leaving this feature enabled.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2019 Cumulative Update 12
Microsoft Exchange Server 2016 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 13

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

EPSS

Процентиль: 70%
0.00638
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
nvd
около 2 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 8
github
около 2 лет назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 8
fstec
около 2 лет назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 70%
0.00638
Низкий

8 High

CVSS3