First published: Tue Jan 10 2023(Updated: )
Microsoft Exchange Server Spoofing Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange Server | =2016-cumulative_update_23 | |
Microsoft Exchange Server | =2019-cumulative_update_11 | |
Microsoft Exchange Server | =2019-cumulative_update_12 | |
Microsoft Exchange Server 2019 | =12 | |
Microsoft Exchange Server 2016 | =23 | |
Microsoft Exchange Server 2019 | =11 | |
=2016-cumulative_update_23 | ||
=2019-cumulative_update_11 | ||
=2019-cumulative_update_12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21745 is high.
Microsoft Exchange Server Spoofing Vulnerability is a vulnerability that allows an attacker to impersonate an email sender by spoofing the source address.
Microsoft Exchange Server 2016 (Cumulative Update 23), Exchange Server 2019 (Cumulative Update 11 and Cumulative Update 12) are affected by CVE-2023-21745.
To fix CVE-2023-21745, Microsoft has released patches for Exchange Server 2016 (Cumulative Update 23) and Exchange Server 2019 (Cumulative Update 11 and Cumulative Update 12). You can download the patches from the Microsoft website.
You can find more information about CVE-2023-21745 on the Microsoft Security Response Center website.