--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'RCE Vulnerability in Microsoft Exchange Server' version: '1.0' number: '2021-063' date: 'November 10, 2021' --- _History:_ * _10/11/2021 --- v1.0 -- Initial publication_ # Summary On November 9, Microsoft released Exchange Server Security Updates fixing several vulnerabilities [1], one of which identified as `CVE-2021-42321` has a CVSS3.1 score of 8.8 out of 10 [2]. This is a post-authentication vulnerability that could allow an attacker to execute remote code on Exchange 2016 and 2019. This vulnerability affects on-premises Microsoft Exchange Server, including servers used in Exchange Hybrid mode. Exchange Online customers are already protected and do not need to take any action. Microsoft is aware of limited targeted attacks by using this vulnerability. CERT-EU recommendation is to install these updates immediately [2]. # Technical Details There is not much detail available about the vulnerability `CVE-2021-42321`[2]. According to Redmond's security advisory, it is caused by improper validation of `cmdlet` arguments. However, attackers must be authenticated. # Affected Products * Microsoft Exchange Server 2019 * Microsoft Exchange Server 2016 To be exploitable, Microsoft Exchange Servers have to be _on-premise_ versions of Microsoft Exchange Server, including servers used in Exchange Hybrid mode. Microsoft Exchange Online is not affected by these flaws. # Recommendations Applying the updates released on November 9 to Exchange servers [2] is currently the only mitigation for this vulnerability: * Exchange Server 2016 CU21 and CU22 * Exchange Server 2019 CU10 and CU11 In order to see if an exploit was attempted, run the following PowerShell query on your Exchange server to check for specific events in the Event Log: ``` Get-EventLog -LogName Application -Source "MSExchange Common" -EntryType Error | Where-Object { $_.Message -like "*BinaryFormatter.Deserialize*" } ``` # References [1] [2]