CVE exchange server
CVE exchange server
The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly
known information-security vulnerabilities and exposures
CVE identifiers are assigned by a CVE Numbering Authority (CNA). There are about 100
CNAs, representing major IT vendors—such as Red Hat, IBM, Cisco, Oracle, and Microsoft—
as well as security companies and research organizations. MITRE can also issue CVEs
directly.
There are multiple ways to evaluate the severity of a vulnerability. One is the Common
Vulnerability Scoring System (CVSS), a set of open standards for assigning a number to a
vulnerability to assess its severity. CVSS scores are used by the NVD, CERT and others to
assess the impact of vulnerabilities. Scores range from 0.0 to 10.0, with higher numbers
representing a higher degree of severity of the vulnerability. Many security vendors have
created their own scoring systems, as well.
1. CVE-2023-36778
Microsoft Exchange Server Remote Code Execution Vulnerability
Security Vulnerability
An authenticated attacker who is on the same intranet as the Exchange server can achieve remote code
execution via a PowerShell remoting session.
According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an
authenticated role on the Exchange Server?
Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user.
According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this
vulnerability?
2. CVE-2023-38185
Microsoft Exchange Server Remote Code Execution Vulnerability
Security Vulnerability
According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an
authenticated role on the Exchange Server?
According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is none
(UI:N). What is the target used in the context of the remote code execution?
The attacker for this vulnerability could target the server accounts in an arbitrary or remote code
execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context
of the server's account through a network call.
In a network-based attack, an attacker could trigger malicious code in the context of the server's account
through a network call.
3. CVE-2023-21764
Microsoft Exchange Server Elevation of Privilege Vulnerability
Security Vulnerability
What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
4. CVE-2023-38181
Microsoft Exchange Server Spoofing Vulnerability
Security Vulnerability
According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of
confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability?
An attacker who successfully exploited this vulnerability could access a user's Net-NTLMv2 hash which
could be used as a basis of an NTLM Relay attack against another service to authenticate as the user.
An authenticated attacker could achieve exploitation by using a PowerShell remoting session to the
server.
According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low
(AC:L). What does that mean for this vulnerability?
The attack vector is set to Network because this vulnerability is remotely exploitable and can be exploited
from the internet.
The attack complexity is set to Low because an attacker does not require significant prior knowledge of
the cluster/system and can achieve repeatable success when attempting to exploit this vulnerability.
Email spoofing
Website and/or URL spoofing
Caller ID spoofing
Text message spoofing
GPS spoofing
Man-in-the-middle attacks
Extension spoofing
IP spoofing
Facial spoofing