CVE-2021-27065

HIGH KEV RANSOMWARE

Microsoft Exchange Server - Path Traversal

Title source: rule

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

Exploits (10)

exploitdb WORKING POC
by testanull · pythonwebappswindows
https://www.exploit-db.com/exploits/49637
nomisec SCANNER 11 stars
by adamrpostjr · poc
https://github.com/adamrpostjr/cve-2021-27065
metasploit SCANNER
by Orange Tsai, mekhalleh (RAMELLA Sébastien) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/exchange_proxylogon.rb
metasploit WORKING POC EXCELLENT
by Orange Tsai, Jang (@testanull), mekhalleh (RAMELLA Sébastien), Le Comptoir Secu, print(, ), lotusdll, Praetorian · rubypocwindows
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_proxylogon_rce.rb
patchapalooza WORKING POC
by ssrsec · remote
https://github.com/ssrsec/Microsoft-Exchange-RCE
patchapalooza WORKING POC
by praetorian-inc · remote
https://github.com/praetorian-inc/proxylogon-exploit
patchapalooza STUB
by hictf · remote
https://github.com/hictf/CVE-2021-26855-CVE-2021-27065
patchapalooza WORKING POC
by p0wershe11 · remote
https://github.com/p0wershe11/ProxyLogon
patchapalooza WORKING POC
by RickGeex · remote
https://github.com/RickGeex/ProxyLogon
patchapalooza WORKING POC
by evilashz · remote
https://github.com/evilashz/ExchangeSSRFtoRCEExploit

Scores

CVSS v3 7.8
EPSS 0.9431
EPSS Percentile 99.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-03-02
InTheWild.io 2021-03-02
ENISA EUVD EUVD-2021-13836
Ransomware Use Confirmed
CWE
CWE-22
Status published
Products (3)
microsoft/exchange_server 2013 cumulative_update_21 (2 CPE variants)
microsoft/exchange_server 2016 cumulative_update_10 (11 CPE variants)
microsoft/exchange_server 2019 (9 CPE variants)
Published Mar 03, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026