First published: Wed Jul 14 2021(Updated: )
Microsoft Exchange Server Remote Code Execution Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=2013-cumulative_update_23 | ||
=2016-cumulative_update_20 | ||
=2016-cumulative_update_21 | ||
=2019-cumulative_update_10 | ||
=2019-cumulative_update_9 | ||
Microsoft Exchange Server | =2013-cumulative_update_23 | |
Microsoft Exchange Server | =2016-cumulative_update_20 | |
Microsoft Exchange Server | =2016-cumulative_update_21 | |
Microsoft Exchange Server | =2019-cumulative_update_10 | |
Microsoft Exchange Server | =2019-cumulative_update_9 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31206 is a vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of Microsoft Exchange Server.
Yes, user interaction is required to exploit this vulnerability.
The vulnerability in CVE-2021-31206 occurs within the parsing of CAB files.
Microsoft Exchange Server 2013 (Cumulative Update 23), Microsoft Exchange Server 2016 (Cumulative Update 20 and Cumulative Update 21), and Microsoft Exchange Server 2019 (Cumulative Update 9 and Cumulative Update 10) are affected by CVE-2021-31206.
CVE-2021-31206 has a severity score of 8, which is considered high.
To fix CVE-2021-31206, apply the relevant security updates provided by Microsoft.
You can find more information about CVE-2021-31206 on the Microsoft Security Response Center website and the Zero Day Initiative website.