Microsoft Exchange Remote Code Execution Vulnerability

High Nessus Network Monitor Plugin ID 701277

Synopsis

The remote host is vulnerable to a Remote Code Execution Vulnerability.

Description

The Microsoft Exchange Server installed on the remote host is missing security updates. A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. An attacker could then install programs; view, change, or delete data; or create new accounts.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html

http://packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html

https://www.zerodayinitiative.com/advisories/ZDI-20-258/

Plugin Details

Severity: High

ID: 701277

Family: SMTP Servers

Published: 2020/03/06

Updated: 2020/03/06

Dependencies: 2004, 2005

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:exchange_server

Patch Publication Date: 2020/02/11

Vulnerability Publication Date: 2020/02/11

Reference Information

CVE: CVE-2020-0688, CVE-2020-0692