First published: Fri Oct 16 2020(Updated: )
<p>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.</p> <p>To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.</p> <p>The security update corrects the way that Exchange handles these token validations.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=2013-cumulative_update_23 | ||
=2016-cumulative_update_17 | ||
=2016-cumulative_update_18 | ||
=2019-cumulative_update_6 | ||
=2019-cumulative_update_7 | ||
Microsoft Exchange Server | =2013-cumulative_update_23 | |
Microsoft Exchange Server | =2016-cumulative_update_17 | |
Microsoft Exchange Server | =2016-cumulative_update_18 | |
Microsoft Exchange Server | =2019-cumulative_update_6 | |
Microsoft Exchange Server | =2019-cumulative_update_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16969 is an information disclosure vulnerability in Microsoft Exchange that allows unauthorized access to certain messages.
CVE-2020-16969 affects Microsoft Exchange versions 2013, 2016, and 2019 that have specific cumulative updates installed.
CVE-2020-16969 has a severity of medium with a CVSS score of 6.5.
To fix CVE-2020-16969, apply the appropriate cumulative update for your version of Microsoft Exchange.
You can find more information about CVE-2020-16969 on the Microsoft Security Guidance advisory page: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16969