Lucene search

K
symantecSymantec Security ResponseSMNTC-108929
HistoryJul 09, 2019 - 12:00 a.m.

Microsoft Exchange Server CVE-2019-1084 Information Disclosure Vulnerability

2019-07-0900:00:00
Symantec Security Response
www.symantec.com
36

0.005 Low

EPSS

Percentile

74.6%

Description

Microsoft Exchange Server is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.

Technologies Affected

  • Microsoft Exchange Server 2010 SP3
  • Microsoft Exchange Server 2013 Cumulative Update 23
  • Microsoft Exchange Server 2016 Cumulative Update 12
  • Microsoft Exchange Server 2016 Cumulative Update 13
  • Microsoft Exchange Server 2019 Cumulative Update 1
  • Microsoft Exchange Server 2019 Cumulative Update 2
  • Microsoft Lync 2013 (32-bit) SP1
  • Microsoft Lync 2013 (64-bit) SP1
  • Microsoft Lync Basic 2013 (32-bit) SP1
  • Microsoft Lync Basic 2013 (64-bit) SP1
  • Microsoft Mail and Calendar
  • Microsoft Office 2013 RT Service Pack 1
  • Microsoft Office 2013 Service Pack 1 (32-bit editions)
  • Microsoft Office 2013 Service Pack 1 (64-bit editions)
  • Microsoft Office 2016 (32-bit edition)
  • Microsoft Office 2016 (64-bit edition)
  • Microsoft Office 2016 for Mac
  • Microsoft Office 2019 for 32-bit editions
  • Microsoft Office 2019 for 64-bit editions
  • Microsoft Office 2019 for Mac
  • Microsoft Office 365 ProPlus for 32-bit Systems
  • Microsoft Office 365 ProPlus for 64-bit Systems
  • Microsoft Outlook 2010 (32-bit editions) Service Pack 2
  • Microsoft Outlook 2010 (64-bit editions) Service Pack 2
  • Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
  • Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
  • Microsoft Outlook 2016 (32-bit editions)
  • Microsoft Outlook 2016 (64-bit editions)
  • Microsoft Outlook for Android
  • Microsoft Outlook for iOS
  • Microsoft Skype for Business 2016 (32-bit)
  • Microsoft Skype for Business 2016 (64-bit)
  • Microsoft Skype for Business Basic 2016 (32-bit)
  • Microsoft Skype for Business Basic 2016 (64-bit)

Recommendations

Block external access at the network boundary, unless external parties require service.
If global access isn’t needed, block access at the network perimeter to computers hosting the vulnerable operating system.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity such as unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.

Communicate sensitive information through secure means.
Implement multiple layers of encryption and authentication to help mitigate against exposure from this and other latent vulnerabilities.

Updates are available. Please see the references or vendor advisory for more information.

0.005 Low

EPSS

Percentile

74.6%