CVE-2020-0688
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- November 04, 2019
- Published Date
- February 11, 2020
- Last Updated
- February 04, 2025
- Vendor
- Microsoft
- Product
- Microsoft Exchange Server 2013, Microsoft Exchange Server 2019 Cumulative Update 3, Microsoft Exchange Server 2016 Cumulative Update 14, Microsoft Exchange Server 2016 Cumulative Update 15, Microsoft Exchange Server 2019 Cumulative Update 4, Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30
- Description
- A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_ecp_viewstate.rb | 2025-04-29 11:01:37 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
exchange_ecp_viewstate
Type: metasploit • Created: Unknown
W01fh4cker/CVE-2020-0688-GUI
Type: github • Created: 2024-05-09 12:50:48 UTC • Stars: 16
chudamax/CVE-2020-0688-Exchange2010
Type: github • Created: 2023-08-02 06:25:06 UTC • Stars: 1
1337-llama/CVE-2020-0688-Python3
Type: github • Created: 2022-10-19 10:36:10 UTC • Stars: 2
MrTiz/CVE-2020-0688
Type: github • Created: 2021-01-04 10:48:40 UTC • Stars: 20
SLSteff/CVE-2020-0688-Scanner
Type: github • Created: 2020-10-29 15:16:24 UTC • Stars: 2
murataydemir/CVE-2020-0688
Type: github • Created: 2020-08-17 12:41:51 UTC • Stars: 4
ktpdpro/CVE-2020-0688
Type: github • Created: 2020-04-22 07:28:32 UTC • Stars: 3
mahyarx/Exploit_CVE-2020-0688
Type: github • Created: 2020-04-05 13:26:03 UTC • Stars: 2
ravinacademy/CVE-2020-0688
Type: github • Created: 2020-03-31 15:29:52 UTC • Stars: 11
cert-lv/CVE-2020-0688
Type: github • Created: 2020-03-19 16:39:56 UTC • Stars: 8
zcgonvh/CVE-2020-0688
Type: github • Created: 2020-03-01 12:57:32 UTC • Stars: 354
youncyb/CVE-2020-0688
Type: github • Created: 2020-02-28 17:03:53 UTC • Stars: 10
onSec-fr/CVE-2020-0688-Scanner
Type: github • Created: 2020-02-28 16:04:30 UTC • Stars: 39
righter83/CVE-2020-0688
Type: github • Created: 2020-02-27 23:55:04 UTC • Stars: 2
Yt1g3r/CVE-2020-0688_EXP
Type: github • Created: 2020-02-27 13:53:46 UTC • Stars: 145
Jumbo-WJB/CVE-2020-0688
Type: github • Created: 2020-02-26 12:28:11 UTC • Stars: 65
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Exploit Used in Malware
-
Added to KEVIntel
-
Proof of Concept Exploit Available
-
Detected by Metasploit