CVE-2020-0688

Description from NVD

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.

Information Acquisition Date:2021-04-27T10:36Z
CVSS 2.0: 9.0 HIGH CVSS 3.x: 8.8 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:S/C:C/I:C/A:C

NVD References

 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688
     source:MISC
     tags:Patch    Vendor Advisory    
 https://www.zerodayinitiative.com/advisories/ZDI-20-258/
     source:MISC
     tags:
 http://packetstormsecurity.com/files/156592/Microsoft-Exchange-2019-15.2.221.12-Remote-Code-Execution.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/156620/Exchange-Control-Panel-Viewstate-Deserialization.html
     source:MISC
     tags:

Description from Forti

Microsoft Exchange Memory Corruption Vulnerability

This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Microsoft Exchange Server.The vulnerability is due to insecure keys. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.

Information Acquisition Date:2020/11/10

Affected Products

Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 3
Microsoft Exchange Server 2016 Cumulative Update 14
Microsoft Exchange Server 2016 Cumulative Update 15
Microsoft Exchange Server 2019 Cumulative Update 4
Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688

References

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Exchange(1 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...179
https://reportcybercrime.com/109
https://lists.astaro.com/ASGV9-IPS-rules.html59
https://cvetrends.com51
https://www.bleepingcomputer.com/news/security/80-percent-o...8
https://www.cisa.gov/uscert/ncas/alerts/aa22-011a7
https://www.helpnetsecurity.com/2020/04/08/exploit-cve-2020...7
http://tweetedtimes.com/vistacomputing?s=tnp5
https://securityaffairs.co/wordpress/108946/hacking/vulnera...5
https://threatpost.com/serious-exchange-flaw-still-plagues-...4
https://blog.rapid7.com/2020/04/06/phishing-for-system-on-m...4
http://ow.ly/lm9X50AiLJW3
https://twitter.com/search?src=sprv&q=CVE-2020-06883
https://www.snort.org/rule_docs/1-533483
https://www.zdnet.com/article/over-350000-microsoft-exchang...3
https://fortiguard.com/encyclopedia/ips/487653
https://reconshell.com/cve-2020-0688-microsoft-exchange-rem...3
https://www.techzine.nl/nieuws/security/439776/patching-mic...3
https://msrc.microsoft.com/update-guide/en-US/vulnerability...3
https://www.checkpoint.com/defense/advisories/public/2020/c...3
https://www.proofpoint.com/us/daily-ruleset-update-summary-...3
http://www.watchguard.com/SecurityPortal/ThreatDetail.aspx?...3
http://update1.hillstonenet.com/support/IPS_Help/en/HTTP/32...3

Information from Twitter

User URL Info Source Date
psyopsnewsSWE https://cyberpolygon.com/materials/okhota-na-ataki-ms-excha... Source psyopsnewsSWE    1631811001443053569 2023/03/04
fletch_ai https://bit.ly/3ZIC4Dr Source fletch_ai        1632915225581084672 2023/03/07
CyberWarship https://github.com/Ridter/cve-2020-0688 Source CyberWarship     1646799774966751232 2023/04/14
hack_git https://github.com/Ridter/cve-2020-0688 Source hack_git         1647334780592070659 2023/04/16
hack_git https://t.me/hackgit/8298 Source hack_git         1647334780592070659 2023/04/16
hack_git https://twitter.com/hack_git/status/1647334780592070659/pho... Source hack_git         1647334780592070659 2023/04/16
ipssignatures https://twitter.com/hack_git/status/1647334780592070659 Source ipssignatures    1647662645766414341 2023/04/17

List of frequently cited URLs

URLNum of Times Referred to
alerts.vulmon.com179
reportcybercrime.com109
lists.astaro.com59
cvetrends.com51
www.bleepingcomputer.com8
www.cisa.gov7
www.helpnetsecurity.com7
tweetedtimes.com5
securityaffairs.co5
threatpost.com4
blog.rapid7.com4
ow.ly3
twitter.com3
www.snort.org3
www.zdnet.com3
fortiguard.com3
reconshell.com3
www.techzine.nl3
msrc.microsoft.com3
www.checkpoint.com3
www.proofpoint.com3
www.watchguard.com3
update1.hillstonenet.com3

Information from Twitter

User URL Info Source
psyopsnewsSWE cyberpolygon.com Show Tweet
fletch_ai bit.ly Show Tweet
CyberWarship github.com Show Tweet
hack_git github.com Show Tweet
hack_git t.me Show Tweet
hack_git twitter.com Show Tweet
ipssignatures twitter.com Show Tweet

GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2023/04/17 Score : 0
Added Har-sia Database : 2020/02/12
Last Modified : 2023/04/17
Highest Scored Date : 2020/04/08
Highest Score : 62