First published: Wed Nov 10 2021(Updated: )
An authenticated attacker could leverage improper validation in cmdlet arguments within Microsoft Exchange and perform remote code execution.
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange Server | =2016-cumulative_update_21 | |
Microsoft Exchange Server | =2016-cumulative_update_22 | |
Microsoft Exchange Server | =2019-cumulative_update_10 | |
Microsoft Exchange Server | =2019-cumulative_update_11 | |
Microsoft Exchange | ||
=2016-cumulative_update_21 | ||
=2016-cumulative_update_22 | ||
=2019-cumulative_update_10 | ||
=2019-cumulative_update_11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42321 is a vulnerability in Microsoft Exchange Server that allows an authenticated attacker to perform remote code execution.
CVE-2021-42321 affects Microsoft Exchange Server versions 2016 Cumulative Update 21, 2016 Cumulative Update 22, 2019 Cumulative Update 10, and 2019 Cumulative Update 11.
CVE-2021-42321 has a severity rating of 8.8 (high).
An authenticated attacker can exploit CVE-2021-42321 by leveraging improper validation in cmdlet arguments within Microsoft Exchange to perform remote code execution.
Yes, Microsoft has released security updates to address CVE-2021-42321. It is recommended to apply the latest Cumulative Updates for the affected versions of Microsoft Exchange Server.