CVE-2020-17132: Microsoft Exchange Remote Code Execution Vulnerability
Overview
- Severity
- Critical (CVSS 9.1)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2020-Dec
- Released
- 2020-12-08
- Last Updated
- 2020-12-08
- EPSS Score
- 82.75% (percentile: 99.2%)
FAQ
What can cause this vulnerability?
The vulnerability occurs due to improper validation of cmdlet arguments.
Does the attacker need to be in an authenticated role in the Exchange Server?
Yes, the attacker must be authenticated.
Detection & Weaponization (1 sources)
Maturity: Exploit
- Metasploit modules: Microsoft Exchange Server DlpUtils AddTenantDlpPolicy RCE
Affected Products (5)
Server Software
- Microsoft Exchange Server 2013 Cumulative Update 23
- Microsoft Exchange Server 2019 Cumulative Update 6
- Microsoft Exchange Server 2016 Cumulative Update 17
- Microsoft Exchange Server 2019 Cumulative Update 7
- Microsoft Exchange Server 2016 Cumulative Update 18
Security Updates (5)
Acknowledgments
Steven Seeley of Source Incite, X41 D-SEC GmbH, Markus Vervier, Yasar Klawohn, Dlive(https://twitter.com/D1iv3) of Tencent Security Xuanwu Lab
Revision History
- 2020-12-08: Information published.
- 2020-12-08: Updated one or more CVSS scores for the affected products. This is an informational change only.