This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the OAB service. The issue results from the lack of proper validation of user-supplied data, which can allow arbitrary files write to OAB folders. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-13610 is considered a critical vulnerability due to its potential for remote code execution on Microsoft Exchange Server installations.
To fix ZDI-CAN-13610, you should apply the latest security updates provided by Microsoft for Exchange Server.
ZDI-CAN-13610 affects various versions of Microsoft Exchange Server that do not have the latest security updates installed.
No, although authentication is required, the vulnerability allows bypassing the existing authentication mechanisms.
If not addressed, ZDI-CAN-13610 could allow attackers to execute arbitrary code, potentially compromising the integrity and confidentiality of your Exchange Server.