Skip to the main content.

1 min read

Microsoft Exchange Server Vulnerability Scanner (CVE-2021-42321)

Featured Image

UPDATE 15.11.2021.

Microsoft patches actively exploited Exchange, Excel zero-days (CVE-2021-42321). Please refer to their site for more details. 

IMPORTANT NOTICE!

We have released a FREE version of DRONE that scans the machine against indicators of the Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-42321).

Steps to use DRONE for scanning against CVE-2021-42321:

  1. Download DRONE 1.7.2 from here

  2. Run it with the command-line DRONE.exe -a vua -n

Note: If you have Chrome installed on the machine, you can also run DRONE in Tower mode in the browser by simply double-clicking the executable and enabling the Vulnerability scanner since we added the Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-42321) identifier to the Vulnerability Analyzer

Optionally, you can enable all analyzers (auto-pilot mode) to have an automated compromise assessment in parallel.

Below you can see the DRONE scanning process

drone-microsoft-exchange-vulnerability

 

Original post


CVE-2021-42321 is an RCE vulnerability in Microsoft Exchange Server. The flaw exists due to the improper validation of command-let (cmdlet) arguments. To exploit this vulnerability, an attacker would need to be authenticated to a vulnerable Exchange Server. Microsoft says they are aware of “limited targeted attacks” using this vulnerability in the wild. Additionally, this appears to be the same vulnerability in Exchange Server that was exploited at the Tianfu Cup, a Chinese cybersecurity contest.