First published: Tue Jan 10 2023(Updated: )
Microsoft Exchange Server Spoofing Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange Server | =2013-cumulative_update_23 | |
Microsoft Exchange Server | =2016-cumulative_update_23 | |
Microsoft Exchange Server | =2019-cumulative_update_11 | |
Microsoft Exchange Server | =2019-cumulative_update_12 | |
Microsoft Exchange Server 2019 | =12 | |
Microsoft Exchange Server 2013 | =23 | |
Microsoft Exchange Server 2019 | =11 | |
Microsoft Exchange Server 2016 | =23 | |
=2013-cumulative_update_23 | ||
=2016-cumulative_update_23 | ||
=2019-cumulative_update_11 | ||
=2019-cumulative_update_12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21762 is a spoofing vulnerability in Microsoft Exchange Server.
CVE-2023-21762 allows an attacker to spoof email messages in Microsoft Exchange Server, potentially leading to phishing attacks and other malicious activities.
CVE-2023-21762 affects Microsoft Exchange Server 2013 (Cumulative Update 23), Microsoft Exchange Server 2016 (Cumulative Update 23), and Microsoft Exchange Server 2019 (Cumulative Update 11 and Cumulative Update 12).
CVE-2023-21762 is considered a high severity vulnerability with a severity score of 8.
To fix CVE-2023-21762, it is recommended to apply the relevant security patches provided by Microsoft. The patches can be downloaded from the following links: - Microsoft Exchange Server 2013: [Patch Link](https://www.microsoft.com/downloads/details.aspx?familyid=789c9179-0a6a-4270-be7c-183850a09b14) - Microsoft Exchange Server 2016: [Patch Link](https://www.microsoft.com/downloads/details.aspx?familyid=e775134a-a23b-4375-8be2-61123b4addd3) - Microsoft Exchange Server 2019: [Patch Link 1](https://www.microsoft.com/downloads/details.aspx?familyid=ecb11461-88df-428b-b0a8-1fa9fa892b25) and [Patch Link 2](https://www.microsoft.com/downloads/details.aspx?familyid=6237df2d-0ad0-415d-8b98-a8c985ed6214)