CVE-2021-42321

HIGH KEV RANSOMWARE

Microsoft Exchange Server - Remote Code Execution

Title source: rule

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

Exploits (4)

nomisec WORKING POC 85 stars
by DarkSprings · remote-auth
https://github.com/DarkSprings/CVE-2021-42321
nomisec WORKING POC 10 stars
by 7BitsTeam · poc
https://github.com/7BitsTeam/exch_CVE-2021-42321
patchapalooza WORKING POC
by FDlucifer · remote-auth
https://github.com/FDlucifer/Proxy-Attackchain
patchapalooza WORKING POC
by tntsec · poc
https://gitee.com/tntsec/CVE-2021-42321

Scores

CVSS v3 8.8
EPSS 0.9362
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-17
VulnCheck KEV 2021-11-09
InTheWild.io 2021-11-09
ENISA EUVD EUVD-2021-29296
Ransomware Use Confirmed
Status published
Products (2)
microsoft/exchange_server 2016 cumulative_update_21 (2 CPE variants)
microsoft/exchange_server 2019 cumulative_update_10 (2 CPE variants)
Published Nov 10, 2021
KEV Added Nov 17, 2021
Tracked Since Feb 18, 2026