This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Powershell service. The issue results from the lack of proper validation of a access token prior to executing the Exchange PowerShell command. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-822 is critical due to its potential for remote code execution without proper authentication.
To fix ZDI-21-822, it is essential to apply the latest security updates provided by Microsoft for Exchange Server.
ZDI-21-822 affects installations of Microsoft Exchange Server that are running vulnerable versions.
No, ZDI-21-822 requires authentication, but the existing authentication mechanism can be bypassed.
ZDI-21-822 is a remote code execution vulnerability that allows attackers to execute arbitrary code on affected systems.