9 CVE-2021-34523
Enriched by CISA CISA Kev Catalog Used by Malware Used by Ransomware Patch Exploit
Microsoft Exchange Server Elevation of Privilege Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2021-34523
Categories
CWE-NVD-noinfo
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
af854a3a-2127-422b-91ae-364da2661108 Patch Exploit
| http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem... Exploit Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3... Patch Vendor Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-21-822/ Third Party Advisory VDB Entry |
secure@microsoft.com Patch Exploit
| http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem... Exploit Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3... Patch Vendor Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-21-822/ Third Party Advisory VDB Entry |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Microsoft Exchange Server 2013 Cumulative Update 23 |
|
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 9 |
|
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 20 |
|
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 19 |
|
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 8 |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:* | ||
REMEDIATION
Patch
| Url |
|---|
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3... |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3... |
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| https://github.com/mithridates1313/ProxyShell_POC |
Other Nist (github, ...)
| Url |
|---|
| http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem... |
| http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem... |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
