CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.8%
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka ‘Microsoft Exchange Memory Corruption Vulnerability’.
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | microsoft_exchange_server_2013 | Cumulative Update 23 | cpe:2.3:a:microsoft:microsoft_exchange_server_2013:Cumulative Update 23:*:*:*:*:*:*:* |
microsoft | exchange_server | * | cpe:2.3:a:microsoft:exchange_server:*:cumulative update 3:*:*:*:*:*:* |
microsoft | exchange_server | * | cpe:2.3:a:microsoft:exchange_server:*:cumulative update 14:*:*:*:*:*:* |
microsoft | exchange_server | * | cpe:2.3:a:microsoft:exchange_server:*:cumulative update 15:*:*:*:*:*:* |
microsoft | exchange_server | * | cpe:2.3:a:microsoft:exchange_server:*:cumulative update 4:*:*:*:*:*:* |
microsoft | windows_azure_pack_rollup | * | cpe:2.3:a:microsoft:windows_azure_pack_rollup:*:*:*:*:*:*:*:* |
[
{
"product": "Microsoft Exchange Server 2013",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "Cumulative Update 23"
}
]
},
{
"product": "Microsoft Exchange Server 2019 Cumulative Update 3",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "unspecified"
}
]
},
{
"product": "Microsoft Exchange Server 2016 Cumulative Update 14",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "unspecified"
}
]
},
{
"product": "Microsoft Exchange Server 2016 Cumulative Update 15",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "unspecified"
}
]
},
{
"product": "Microsoft Exchange Server 2019 Cumulative Update 4",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "unspecified"
}
]
},
{
"product": "Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "unspecified"
}
]
}
]
packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html
packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688
www.zerodayinitiative.com/advisories/ZDI-20-258/
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.8%