CVE-2023-21745: Microsoft Exchange Server Spoofing Vulnerability
Overview
- Severity
- High (CVSS 8)
- CVSS Vector
- CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Spoofing
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- More Likely
- Patch Tuesday
- 2023-Jan
- Released
- 2023-01-10
- EPSS Score
- 0.39% (percentile: 60.0%)
FAQ
According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
An authenticated attacker could exploit this vulnerability LAN-side or potentially from the internet.
How could an attacker exploit this vulnerability?
An authenticated attacker could achieve exploitation by using a PowerShell remoting session to the server.
Affected Products (3)
Server Software
- Microsoft Exchange Server 2016 Cumulative Update 23
- Microsoft Exchange Server 2019 Cumulative Update 12
- Microsoft Exchange Server 2019 Cumulative Update 11
Security Updates (3)
Acknowledgments
<a href="https://twitter.com/chudypb">Piotr Bazydlo (@chudypb)</a> working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>
Revision History
- 2023-01-10: Information published.