CVE-2020-0688

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka...

Basic Information

CVE State
PUBLISHED
Reserved Date
November 04, 2019
Published Date
February 11, 2020
Last Updated
February 04, 2025
Vendor
Microsoft
Product
Microsoft Exchange Server 2013, Microsoft Exchange Server 2019 Cumulative Update 3, Microsoft Exchange Server 2016 Cumulative Update 14, Microsoft Exchange Server 2016 Cumulative Update 15, Microsoft Exchange Server 2019 Cumulative Update 4, Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30
Description
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.
Tags
cisa malware ransomware microsoft metasploit_scanner

CVSS Scores

CVSS v3.1

8.8 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2021-11-03 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-10-19 10:36:10 UTC) Source
Used in Malware
Yes (added 2021-11-03 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2021-11-03 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

exchange_ecp_viewstate

Type: metasploit • Created: Unknown

Metasploit module for CVE-2020-0688

W01fh4cker/CVE-2020-0688-GUI

Type: github • Created: 2024-05-09 12:50:48 UTC • Stars: 16

GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)

chudamax/CVE-2020-0688-Exchange2010

Type: github • Created: 2023-08-02 06:25:06 UTC • Stars: 1

CVE-2020-0688 modified exploit for Exchange 2010

1337-llama/CVE-2020-0688-Python3

Type: github • Created: 2022-10-19 10:36:10 UTC • Stars: 2

Exploit updated to use Python 3.

MrTiz/CVE-2020-0688

Type: github • Created: 2021-01-04 10:48:40 UTC • Stars: 20

Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys

SLSteff/CVE-2020-0688-Scanner

Type: github • Created: 2020-10-29 15:16:24 UTC • Stars: 2

Scans for Microsoft Exchange Versions with masscan

murataydemir/CVE-2020-0688

Type: github • Created: 2020-08-17 12:41:51 UTC • Stars: 4

[CVE-2020-0688] Microsoft Exchange Server Fixed Cryptographic Key Remote Code Execution (RCE)

ktpdpro/CVE-2020-0688

Type: github • Created: 2020-04-22 07:28:32 UTC • Stars: 3

PoC RCE Reverse Shell for CVE-2020-0688

mahyarx/Exploit_CVE-2020-0688

Type: github • Created: 2020-04-05 13:26:03 UTC • Stars: 2

CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"

ravinacademy/CVE-2020-0688

Type: github • Created: 2020-03-31 15:29:52 UTC • Stars: 11

Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"

cert-lv/CVE-2020-0688

Type: github • Created: 2020-03-19 16:39:56 UTC • Stars: 8

Vulnerability scanner for CVE-2020-0688

zcgonvh/CVE-2020-0688

Type: github • Created: 2020-03-01 12:57:32 UTC • Stars: 354

Exploit and detect tools for CVE-2020-0688

youncyb/CVE-2020-0688

Type: github • Created: 2020-02-28 17:03:53 UTC • Stars: 10

CVE-2020-0688

onSec-fr/CVE-2020-0688-Scanner

Type: github • Created: 2020-02-28 16:04:30 UTC • Stars: 39

Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.

righter83/CVE-2020-0688

Type: github • Created: 2020-02-27 23:55:04 UTC • Stars: 2

Exchange Scanner CVE-2020-0688

Yt1g3r/CVE-2020-0688_EXP

Type: github • Created: 2020-02-27 13:53:46 UTC • Stars: 145

CVE-2020-0688_EXP Auto trigger payload & encrypt method

Jumbo-WJB/CVE-2020-0688

Type: github • Created: 2020-02-26 12:28:11 UTC • Stars: 65

CVE-2020-0688 - Exchange

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Exploit Used in Malware

  • Added to KEVIntel

  • Proof of Concept Exploit Available

  • Detected by Metasploit