Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-26198

Опубликовано: 12 мар. 2024
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Microsoft Exchange Server Remote Code Execution Vulnerability

FAQ

How could an attacker exploit this vulnerability?

An unauthenticated attacker could exploit the vulnerability by placing a specially crafted file onto an online directory or in a local network location then convincing the user to open it. In a successful attack, this will then load a malicious DLL which could lead to a remote code execution.

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a specially crafted file to be placed either in an online directory or in a local network location. When a victim runs this file, it loads the malicious DLL.

Обновления

ПродуктСтатьяОбновление
Microsoft Exchange Server 2016 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 13
Microsoft Exchange Server 2019 Cumulative Update 14

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 89%
0.04686
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 2 года назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 8.8
github
почти 2 года назад

Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость почтового сервера Microsoft Exchange Server, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 89%
0.04686
Низкий

8.8 High

CVSS3