8.8
CVE-2021-42321
- EPSS 93.29%
- Veröffentlicht 10.11.2021 01:19:50
- Zuletzt bearbeitet 07.03.2025 21:54:07
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Microsoft Exchange Server Remote Code Execution Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_21
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_22
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_10
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_11
17.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Exchange Server Remote Code Execution Vulnerability
SchwachstelleAn authenticated attacker could leverage improper validation in cmdlet arguments within Microsoft Exchange and perform remote code execution.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 93.29% | 0.998 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
secure@microsoft.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|