CVE-2021-26857

HIGH
2021-03-03 [email protected]
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:19 vuln.today
Added to CISA KEV
Dec 18, 2025 - 02:00 cisa
CISA KEV
Patch Released
Dec 18, 2025 - 02:00 nvd
Patch available
CVE Published
Mar 03, 2021 - 00:15 nvd
HIGH 7.8

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

Analysis

Microsoft Exchange Server Unified Messaging service contains a deserialization vulnerability that allows authenticated attackers to execute code as SYSTEM, part of the ProxyLogon exploit chain.

Technical Context

The CWE-502 deserialization flaw in the Unified Messaging service processes untrusted serialized .NET objects. When chained with the ProxyLogon SSRF, an unauthenticated attacker can deliver the malicious payload to the Unified Messaging endpoint for code execution as SYSTEM.

Affected Products

['Microsoft Exchange Server 2013/2016/2019 (with Unified Messaging role)']

Remediation

Apply Microsoft security updates. Disable Unified Messaging if not required. Monitor for deserialization attack indicators.

Priority Score

139
Low Medium High Critical
KEV: +50
EPSS: +40.5
CVSS: +39
POC: 0

Share

CVE-2021-26857 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy