9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
10 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.973 High
EPSS
Percentile
99.9%
07/13/2021
Critical
Multiple vulnerabilities were found in Microsoft Exchange Server. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.
Public exploits exist for this vulnerability.
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2019 Cumulative Update 9
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 20
Microsoft Exchange Server 2019 Cumulative Update 8
Microsoft Exchange Server 2016 Cumulative Update 19
Microsoft Exchange Server 2016 Cumulative Update 21
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2021-31196
CVE-2021-34470
CVE-2021-31206
CVE-2021-34473
CVE-2021-34523
CVE-2021-33766
CVE-2021-33768
ACE
CVE-2021-311967.2High
CVE-2021-344708.0Critical
CVE-2021-312067.6Critical
CVE-2021-344739.1Critical
CVE-2021-345239.0Critical
CVE-2021-337667.3High
CVE-2021-337688.0Critical
5001779
5004780
5004778
5004779
5003611
5003612
support.microsoft.com/kb/5001779
support.microsoft.com/kb/5003611
support.microsoft.com/kb/5003612
support.microsoft.com/kb/5004778
support.microsoft.com/kb/5004779
support.microsoft.com/kb/5004780
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31196
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31206
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33766
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33768
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34470
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34473
api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31196
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34523
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Exchange-Server/
9.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
10 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.973 High
EPSS
Percentile
99.9%