CVE-2021-31207

MEDIUM KEV RANSOMWARE

Microsoft Exchange Server - Unrestricted File Upload

Title source: rule

Description

Microsoft Exchange Server Security Feature Bypass Vulnerability

Exploits (7)

metasploit WORKING POC EXCELLENT
by Orange Tsai, Jang (@testanull), PeterJson, brandonshi123, mekhalleh (RAMELLA Sébastien), Donny Maasland, Rich Warren, Spencer McIntyre, wvu · rubypocwindows
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_proxyshell_rce.rb
patchapalooza WORKING POC
by horizon3ai · remote
https://github.com/horizon3ai/proxyshell
patchapalooza WORKING POC
by aravazhimdr · remote
https://github.com/aravazhimdr/ProxyShell-POC-Mod
patchapalooza WORKING POC
by Udyz · remote
https://github.com/Udyz/proxyshell-auto
patchapalooza WORKING POC
by dmaasland · remote
https://github.com/dmaasland/proxyshell-poc
patchapalooza WORKING POC
by ktecv2000 · remote
https://github.com/ktecv2000/ProxyShell
patchapalooza SCANNER
by cyberheartmi9 · infoleak
https://github.com/cyberheartmi9/Proxyshell-Scanner

Scores

CVSS v3 6.6
EPSS 0.9396
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-08-30
InTheWild.io 2021-08-24
ENISA EUVD EUVD-2021-18120
Ransomware Use Confirmed
CWE
CWE-434
Status published
Products (3)
microsoft/exchange_server 2013 cumulative_update_23
microsoft/exchange_server 2016 cumulative_update_19 (2 CPE variants)
microsoft/exchange_server 2019 cumulative_update_8 (2 CPE variants)
Published May 11, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026