CVE-2021-26855 (CNNVD-202103-192)

CRITICAL 有利用代码
中文标题:
Microsoft Exchange Server 代码问题漏洞
英文标题:
Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS分数: 9.1
发布时间: 2021-03-02 23:55:26
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v7
漏洞描述
中文描述:

Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server 存在代码问题漏洞。攻击者可构造恶意HTTP请求,并通过Exchange Server进行身份验证。进而扫描内网,获取用户敏感信息。以下产品和版本受到影响:Microsoft Exchange Server 2013 Cumulative Update 23,Microsoft Exchange Server 2019 Cumulative Update 7,Microsoft Exchange Server 2016 Cumulative Update 18,Microsoft Exchange Server 2016 Cumulative Update 19,Microsoft Exchange Server 2019 Cumulative Update 8。

英文描述:

NOT_EXTRACTED

CWE类型:
CWE-918
标签:
webapps windows testanull remote F5 Gonzalo Villegas mekhalleh
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Microsoft Exchange Server 2016 Cumulative Update 19 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 8 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:*:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2013 Cumulative Update 22 2013 < publication - cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_22:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 2 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 13 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2013 Cumulative Update 23 2013 < publication - cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 3 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 14 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 4 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 15 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 5 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 6 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 16 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 17 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 7 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 18 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2013 Cumulative Update 21 2013 < publication - cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 12 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 8 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2019 Cumulative Update 1 2019 < publication - cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 9 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 10 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*
Microsoft Microsoft Exchange Server 2016 Cumulative Update 11 2016 < publication - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*
microsoft exchange_server 2013 - - cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*
microsoft exchange_server 2016 - - cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*
microsoft exchange_server 2019 - - cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
ExploitDB EDB-49637 EXPLOIT
exploitdb
访问
Download Exploit EDB-49637 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2021-27065 ADVISORY
cve.org
访问
CVE Reference: CVE-2021-26855 ADVISORY
cve.org
访问
ExploitDB EDB-49663 EXPLOIT
exploitdb
访问
Download Exploit EDB-49663 EXPLOIT
exploitdb
访问
ExploitDB EDB-49879 EXPLOIT
exploitdb
访问
Download Exploit EDB-49879 EXPLOIT
exploitdb
访问
ExploitDB EDB-49895 EXPLOIT
exploitdb
访问
Download Exploit EDB-49895 EXPLOIT
exploitdb
访问
CVSS评分详情
3.1 (cna)
CRITICAL
9.1
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:F/RL:O/RC:C
机密性
HIGH
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2021-03-02 23:55:26
修改时间:
2025-10-21 23:25:53
创建时间:
2025-11-11 15:36:45
更新时间:
2025-11-11 16:57:55
利用信息
此漏洞有可利用代码!
利用代码数量: 4
利用来源:
未知 未知 未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2021-26855 2025-11-11 15:20:53 2025-11-11 07:36:45
NVD nvd_CVE-2021-26855 2025-11-11 14:57:34 2025-11-11 07:45:05
CNNVD cnnvd_CNNVD-202103-192 2025-11-11 15:10:35 2025-11-11 07:56:39
EXPLOITDB exploitdb_EDB-49637 2025-11-11 15:05:58 2025-11-11 08:57:20
EXPLOITDB exploitdb_EDB-49663 2025-11-11 15:05:56 2025-11-11 08:57:24
EXPLOITDB exploitdb_EDB-49879 2025-11-11 15:05:58 2025-11-11 08:57:53
EXPLOITDB exploitdb_EDB-49895 2025-11-11 15:05:58 2025-11-11 08:57:55
版本与语言
当前版本: v7
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v7 EXPLOITDB
2025-11-11 16:57:55
references_count: 14 → 16; tags_count: 6 → 7
查看详细变更
  • references_count: 14 -> 16
  • tags_count: 6 -> 7
v6 EXPLOITDB
2025-11-11 16:57:53
references_count: 12 → 14; tags_count: 5 → 6
查看详细变更
  • references_count: 12 -> 14
  • tags_count: 5 -> 6
v5 EXPLOITDB
2025-11-11 16:57:24
references_count: 10 → 12; tags_count: 3 → 5
查看详细变更
  • references_count: 10 -> 12
  • tags_count: 3 -> 5
v4 EXPLOITDB
2025-11-11 16:57:20
references_count: 6 → 10; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 6 -> 10
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:56:39
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-202103-192; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-202103-192
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:45:05
affected_products_count: 24 → 27; references_count: 5 → 6; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 24 -> 27
  • references_count: 5 -> 6
  • data_sources: ['cve'] -> ['cve', 'nvd']