Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server Remote Code Execution Vulnerability

A critical* Microsoft Exchange Server Remote Code Execution Vulnerability with a CVSS 3.1 score of 9.0 was released.

Microsoft Exchange Server Remote Code Execution Vulnerability-26427

An attacker who successfully exploits this vulnerability can run arbitrary code in the context of the system user. The exploitation of this vulnerability requires an authenticated user in a certain exchange role to be compromised. Even though no exploit regarding this vulnerability has been discovered, due to its severity/criticality, it is highly recommended that the following patches are downloaded to ensure the safety of systems/assets.

Affected Systems

The following servers/systems are affected by this vulnerability;

  • Microsoft Exchange Server 2019 Cumulative Update 10
  • Microsoft Exchange Server 2016 Cumulative Update 21
  • Microsoft Exchange Server 2013 Cumulative Update 23
  • Microsoft Exchange Server 2019 Cumulative Update 11
  • Microsoft Exchange Server 2016 Cumulative Update 22

IoC’s

-

Recommended Solution(s)

Organizations using the following products are recommended to download the patches in the table below.

Product Article Patch
Microsoft Exchange Server 2019 Cumulative Update 10 5007012 Security Update
Microsoft Exchange Server 2016 Cumulative Update 21 5007012 Security Update
Microsoft Exchange Server 2013 Cumulative Update 23 5007011 Security Update
Microsoft Exchange Server 2019 Cumulative Update 11 5007012 Security Update
Microsoft Exchange Server 2016 Cumulative Update 22 5007012 Security Update

CVE / CWE

CVE-2021-26427

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.