asked on
We had a firm run an independent scan on our Windows 2016/Exchange 2016 Server and the one weakness they found running a PIN test is listed below:
We are looking for any recommendations/advice to patch this vulnerability. Thank you.
Critical | ||||
10 | CVE | CVE-2021-34473 | ||
IP(s) | ||||
Description | ||||
The Microsoft Exchange running on the remote host is affected by a remote code execution vulnerability. An unauthenticated remote attacker can exploit this to execute arbitrary code. | ||||
Solution | ||||
Microsoft has released the following security updates to address this issue: -KB5001799 |
ASKER
ASKER
ASKER
Exchange is the server side of a collaborative application product that is part of the Microsoft Server infrastructure. Exchange's major features include email, calendaring, contacts and tasks, support for mobile and web-based access to information, and support for data storage.
TRUSTED BY
ASKER
suggest going to CU21 (final CU) and the following security update released in July
Exchange has been a big hacker target in recent months so make sure you keep up with updates"
Do you know if we can bypass the CU 19 updates and the updates from May and right to the July CU updates?