CVE-2021-26855
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Lifecycle Timeline
5Description
Microsoft Exchange Server Remote Code Execution Vulnerability
Analysis
Microsoft Exchange Server contains a server-side request forgery (SSRF) vulnerability known as 'ProxyLogon' that allows unauthenticated attackers to access Exchange backend services, chain with other vulnerabilities for full server compromise. The most impactful Exchange vulnerability in history.
Technical Context
The CWE-918 SSRF in Exchange's autodiscover endpoint allows an unauthenticated attacker to send crafted requests that the Exchange server forwards to its backend services as SYSTEM. This bypass of authentication is chained with CVE-2021-26857 (deserialization), CVE-2021-26858, and CVE-2021-27065 (file write) for complete server compromise.
Affected Products
['Microsoft Exchange Server 2013', 'Microsoft Exchange Server 2016', 'Microsoft Exchange Server 2019']
Remediation
Apply Microsoft security updates immediately. Run the MSERT tool to detect web shells. Check for indicators of compromise (aspx files in OWA/ECP directories, suspicious PowerShell execution). Assume compromise if running vulnerable versions during the exploitation window.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today