Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2023-21742

8.8HIGH

Summary

The vulnerability in Microsoft SharePoint Server allows attackers to execute arbitrary code on the server. This can lead to unauthorized access to sensitive information and compromised systems. Ensuring your SharePoint installation is up-to-date with the latest security patches is critical to protect against potential exploitation. For more information and mitigation strategies, refer to the Microsoft advisory.

Affected Version(s)

Microsoft SharePoint Enterprise Server 2013 Service Pack 1 x64-based Systems 15.0.0 < 15.0.5519.1000

Microsoft SharePoint Enterprise Server 2016 x64-based Systems 16.0.0 < 16.0.5378.1000

Microsoft SharePoint Foundation 2013 Service Pack 1 x64-based Systems 15.0.0 < 15.0.5519.1000

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.