First published: Tue Nov 12 2019(Updated: )
A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange Server | =2013-cumulative_update_23 | |
Microsoft Exchange Server | =2016-cumulative_update_13 | |
Microsoft Exchange Server | =2016-cumulative_update_14 | |
Microsoft Exchange Server | =2019-cumulative_update_2 | |
Microsoft Exchange Server | =2019-cumulative_update_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1373 has a CVSS score of 9.8, indicating a critical severity vulnerability.
To fix CVE-2019-1373, install the latest cumulative updates for Microsoft Exchange Server 2013, 2016, or 2019.
CVE-2019-1373 affects Microsoft Exchange Server 2013 (CU23), 2016 (CU13 and CU14), and 2019 (CU2 and CU3).
Yes, CVE-2019-1373 is a remote code execution vulnerability, which can be exploited over the network.
CVE-2019-1373 facilitates remote code execution attacks through the deserialization of metadata via PowerShell.