CVE-2023-36035: Microsoft Exchange Server Spoofing Vulnerability

Overview

Severity
High (CVSS 8)
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Patch Tuesday
2023-Nov
Released
2023-11-14
Last Updated
2023-12-04
EPSS Score
4.09% (percentile: 88.6%)

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which could be used as a basis of an NTLM Relay attack against another service to authenticate as the user. According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server? Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user. How could an attacker exploit this vulnerability? An authenticated attacker could achieve exploitation by using a PowerShell remoting session to the server. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access.

Affected Products (3)

Server Software

  • Microsoft Exchange Server 2016 Cumulative Update 23
  • Microsoft Exchange Server 2019 Cumulative Update 12
  • Microsoft Exchange Server 2019 Cumulative Update 13

Security Updates (3)

Acknowledgments

Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative, Anna @little_pwner and @Voorivex Academy

Revision History

  • 2023-11-14: Information published.
  • 2023-12-04: Added an acknowledgement. This is an informational change only.