vendor:
Exchange Server
by:
RAMELLA Sébastien
7.8
CVSS
HIGH
Bypassing authentication and impersonating as the admin
284
CWE
Product Name: Exchange Server
Affected Version From: Exchange 2013 Versions < 15.00.1497.012, Exchange 2016 CU18 < 15.01.2106.013, Exchange 2016 CU19 < 15.01.2176.009, Exchange 2019 CU7 < 15.02.0721.013, Exchange 2019 CU8 < 15.02.0792.010
Affected Version To: Exchange 2013 Versions < 15.00.1497.012, Exchange 2016 CU18 < 15.01.2106.013, Exchange 2016 CU19 < 15.01.2176.009, Exchange 2019 CU7 < 15.02.0721.013, Exchange 2019 CU8 < 15.02.0792.010
Patch Exists: YES
Related CWE: CVE-2021-26855, CVE-2021-27065
CPE: 2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*
Metasploit:
https://www.rapid7.com/db/vulnerabilities/msft-cve-2021-27065/, https://www.rapid7.com/db/modules/auxiliary/gather/exchange_proxylogon_collector/, https://www.rapid7.com/db/modules/exploit/windows/http/exchange_proxylogon_rce/, https://www.rapid7.com/db/vulnerabilities/msft-cve-2021-26855/, https://www.rapid7.com/db/modules/auxiliary/scanner/http/exchange_proxylogon/, https://www.rapid7.com/db/vulnerabilities/msft-cve-2021-26858/, https://www.rapid7.com/db/vulnerabilities/msft-cve-2021-27065/, https://www.rapid7.com/db/modules/exploit/windows/http/exchange_proxylogon_rce/, https://www.rapid7.com/db/modules/auxiliary/scanner/http/exchange_proxylogon/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=147171, https://www.infosecmatter.com/nessus-plugin-library/?id=147193, https://www.infosecmatter.com/nessus-plugin-library/?id=147003, https://www.infosecmatter.com/nessus-plugin-library/?id=147024, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/exchange_proxylogon_rce, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/gather/exchange_proxylogon_collector, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/exchange_proxylogon, https://www.infosecmatter.com/nessus-plugin-library/?id=147223, https://www.infosecmatter.com/nessus-plugin-library/?id=147226, https://www.infosecmatter.com/top-10-vulnerabilities-internal-infrastructure-pentest/, https://www.infosecmatter.com/nessus-plugin-library/?id=147193, https://www.infosecmatter.com/nessus-plugin-library/?id=147171, https://www.infosecmatter.com/nessus-plugin-library/?id=147003, https://www.infosecmatter.com/nessus-plugin-library/?id=147024, https://www.infosecmatter.com/metasploit-module-library/?mm=auxiliary/scanner/http/exchange_proxylogon, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/http/exchange_proxylogon_rce, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/metasploit-auxiliary-modules-detailed-spreadsheet/
Platforms Tested: Microsoft Windows 2012 R2 - Exchange 2016
2021
Microsoft Exchange 2019 – Unauthenticated Email Download (Metasploit)
This module scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855). By chaining this bug with another post-auth arbitrary-file-write vulnerability to get code execution (CVE-2021-27065). As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server.
Mitigation:
Microsoft has released security updates to address this vulnerability. Users should update their systems to the latest version.