First published: Tue Jul 13 2021(Updated: )
Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange | ||
Microsoft Exchange Server 2016 | =19 | |
Microsoft Exchange Server 2016 | =20 | |
Microsoft Exchange Server 2013 | =23 | |
Microsoft Exchange Server 2019 | =8 | |
Microsoft Exchange Server 2019 | =9 | |
Microsoft Exchange Server | =2013-cumulative_update_23 | |
Microsoft Exchange Server | =2016-cumulative_update_19 | |
Microsoft Exchange Server | =2016-cumulative_update_20 | |
Microsoft Exchange Server | =2019-cumulative_update_8 | |
Microsoft Exchange Server | =2019-cumulative_update_9 | |
Microsoft Exchange Server | ||
=2013-cumulative_update_23 | ||
=2016-cumulative_update_19 | ||
=2016-cumulative_update_20 | ||
=2019-cumulative_update_8 | ||
=2019-cumulative_update_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34523 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server.
CVE-2021-34523 has a severity rating of 9.8, which is considered critical.
CVE-2021-34523 affects Microsoft Exchange Server 2013, Microsoft Exchange Server 2016, and Microsoft Exchange Server 2019.
To fix CVE-2021-34523, you should apply the corresponding security patches provided by Microsoft for your specific version of Exchange Server.
You can find more information about CVE-2021-34523 on the official Microsoft Security Response Center website and the Zero Day Initiative website.