CVE-2021-27065
HIGH KEV RANSOMWAREMicrosoft Exchange Server - Path Traversal
Title source: ruleDescription
Microsoft Exchange Server Remote Code Execution Vulnerability
Exploits (10)
metasploit
SCANNER
by Orange Tsai, mekhalleh (RAMELLA Sébastien) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/exchange_proxylogon.rb
metasploit
WORKING POC
EXCELLENT
by Orange Tsai, Jang (@testanull), mekhalleh (RAMELLA Sébastien), Le Comptoir Secu, print(, ), lotusdll, Praetorian · rubypocwindows
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_proxylogon_rce.rb
patchapalooza
WORKING POC
by praetorian-inc · remote
https://github.com/praetorian-inc/proxylogon-exploit
References (4)
Scores
CVSS v3
7.8
EPSS
0.9431
EPSS Percentile
99.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-03-02
InTheWild.io
2021-03-02
ENISA EUVD
EUVD-2021-13836
Ransomware Use
Confirmed
CWE
CWE-22
Status
published
Products (3)
microsoft/exchange_server
2013 cumulative_update_21 (2 CPE variants)
microsoft/exchange_server
2016 cumulative_update_10 (11 CPE variants)
microsoft/exchange_server
2019 (9 CPE variants)
Published
Mar 03, 2021
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026