CVE-2020-0688

HIGH KEV RANSOMWARE

Microsoft Exchange Server - Authentication Bypass

Title source: rule

Description

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.

Exploits (33)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/48168
exploitdb WORKING POC
by Photubias · pythonremotewindows
https://www.exploit-db.com/exploits/48153
nomisec WORKING POC 356 stars
by zcgonvh · poc
https://github.com/zcgonvh/CVE-2020-0688
nomisec WORKING POC 330 stars
by Ridter · remote-auth
https://github.com/Ridter/cve-2020-0688
nomisec STUB 166 stars
by random-robbie · poc
https://github.com/random-robbie/cve-2020-0688
nomisec WORKING POC 146 stars
by Yt1g3r · remote-auth
https://github.com/Yt1g3r/CVE-2020-0688_EXP
nomisec WORKING POC 66 stars
by Jumbo-WJB · poc
https://github.com/Jumbo-WJB/CVE-2020-0688
nomisec SCANNER 38 stars
by onSec-fr · poc
https://github.com/onSec-fr/CVE-2020-0688-Scanner
nomisec WORKING POC 24 stars
by w4fz5uck5 · remote-auth
https://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique
nomisec WORKING POC 22 stars
by MrTiz · remote-auth
https://github.com/MrTiz/CVE-2020-0688
nomisec WORKING POC 16 stars
by W01fh4cker · remote-auth
https://github.com/W01fh4cker/CVE-2020-0688-GUI
nomisec WORKING POC 11 stars
by zyn3rgy · remote-auth
https://github.com/zyn3rgy/ecp_slap
nomisec WORKING POC 11 stars
by ravinacademy · poc
https://github.com/ravinacademy/CVE-2020-0688
nomisec WORKING POC 10 stars
by youncyb · poc
https://github.com/youncyb/CVE-2020-0688
nomisec SCANNER 8 stars
by cert-lv · poc
https://github.com/cert-lv/CVE-2020-0688
nomisec WORKING POC 5 stars
by justin-p · poc
https://github.com/justin-p/PSForgot2kEyXCHANGE
nomisec WORKING POC 4 stars
by murataydemir · remote-auth
https://github.com/murataydemir/CVE-2020-0688
nomisec WORKING POC 3 stars
by ktpdpro · poc
https://github.com/ktpdpro/CVE-2020-0688
nomisec WORKING POC 2 stars
by 1337-llama · remote-auth
https://github.com/1337-llama/CVE-2020-0688-Python3
nomisec WORKING POC 2 stars
by chudamax · remote-auth
https://github.com/chudamax/CVE-2020-0688-Exchange2010
nomisec SCANNER 2 stars
by righter83 · poc
https://github.com/righter83/CVE-2020-0688
nomisec SCANNER 2 stars
by SLSteff · poc
https://github.com/SLSteff/CVE-2020-0688-Scanner
nomisec WORKING POC 2 stars
by mahyarx · poc
https://github.com/mahyarx/Exploit_CVE-2020-0688
nomisec WORKING POC 1 stars
by truongtn · poc
https://github.com/truongtn/cve-2020-0688
nomisec WRITEUP
by iamwajd · poc
https://github.com/iamwajd/Cyber-Attack-Analysis
nomisec WORKING POC
by tvdat20004 · remote-auth
https://github.com/tvdat20004/CVE-2020-0688
nomisec WORKING POC
by 7heKnight · remote-auth
https://github.com/7heKnight/CVE-2020-0688
metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_ecp_viewstate.rb
patchapalooza WORKING POC
by mirrors_zcgonvh · poc
https://gitee.com/mirrors_zcgonvh/CVE-2020-0688
patchapalooza WORKING POC
by Ken-Abruzzi · remote-auth
https://github.com/Ken-Abruzzi/cve_2020_0688
patchapalooza WORKING POC
by sh3llsas · poc
https://gitee.com/sh3llsas/CVE-2020-0688_EXP
patchapalooza WORKING POC
by kevin66654 · poc
https://gitee.com/kevin66654/Exchange-EXP-CVE-2020-0688

Scores

CVSS v3 8.8
EPSS 0.9440
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2020-03-10
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2020-2181
Ransomware Use Confirmed
CWE
CWE-287
Status published
Products (4)
microsoft/exchange_server 2010 sp3_rollup_30
microsoft/exchange_server 2013 cumulative_update_23
microsoft/exchange_server 2016 cumulative_update_14 (2 CPE variants)
microsoft/exchange_server 2019 cumulative_update_3 (2 CPE variants)
Published Feb 11, 2020
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026