Microsoft Exchange Server Remote Code Execution Vulnerability
Published: 2021-03-03
Four zero-day vulnerabilities in Microsoft Exchange servers have been used in chained attacks in the wild.
https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/
https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
https://hackread.com/chinese-silk-typhoon-group-it-tools-network-breaches/
https://www.theregister.com/2024/11/27/salt_typhoons_us_telcos/
https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
https://www.trendmicro.com/en_us/research/24/k/earth-estries.html
https://www.darkreading.com/threat-intelligence/prometei-botnet-cryptojacker-worldwide
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a
https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective
https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-209a
https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/
https://msrc.microsoft.com/blog/2021/03/multiple-security-updates-released-for-exchange-server/
Published: 2021-03-03
Updated: 2025-03-07
Named Vulnerability: ProxyShellNamed Vulnerability: ProxyLogonKnown Exploited Vulnerability (KEV)
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.94332