CVE-2021-34473

Microsoft Exchange Server Remote Code Execution Vulnerability

Basic Information

CVE State
PUBLISHED
Reserved Date
June 09, 2021
Published Date
July 14, 2021
Last Updated
February 04, 2025
Vendor
Microsoft
Product
Microsoft Exchange Server 2013 Cumulative Update 23, Microsoft Exchange Server 2019 Cumulative Update 9, Microsoft Exchange Server 2016 Cumulative Update 20, Microsoft Exchange Server 2016 Cumulative Update 19, Microsoft Exchange Server 2019 Cumulative Update 8
Description
Microsoft Exchange Server Remote Code Execution Vulnerability

CVSS Scores

CVSS v3.1

9.1 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2021-11-03 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-11-16 08:22:29 UTC) Source
Used in Malware
Yes (added 2021-11-03 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2021-11-03 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

ipsBruno/CVE-2021-34473-NMAP-SCANNER

Type: github • Created: 2022-11-16 08:22:29 UTC • Stars: 2

A massive scanner for CVE-2021-34473 Microsoft Exchange Windows Vulnerability

je6k/CVE-2021-34473-Exchange-ProxyShell

Type: github • Created: 2021-11-22 07:47:09 UTC • Stars: 17

对Exchange Proxyshell 做了二次修改,精确的拆分、实现辅助性安全测试。

p2-98/CVE-2021-34473

Type: github • Created: 2021-08-16 11:27:13 UTC • Stars: 30

CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability

RaouzRouik/CVE-2021-34473-scanner

Type: github • Created: 2021-08-11 12:20:07 UTC • Stars: 6

Scanner for CVE-2021-34473, ProxyShell, A Microsoft Exchange On-premise Vulnerability