CVE-2021-26858

7.8 HIGH

📋 TL;DR

CVE-2021-26858 is a remote code execution vulnerability in Microsoft Exchange Server that allows an attacker to execute arbitrary code on affected servers by sending specially crafted HTTP requests. It affects organizations running on-premises Exchange Server installations, potentially enabling full server compromise.

💻 Affected Systems

Products:
  • Microsoft Exchange Server
Versions: Exchange Server 2013, 2016, and 2019
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects on-premises deployments; Exchange Online is not vulnerable. Requires the server to be accessible via HTTP.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of the Exchange Server, leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive email data, installation of backdoors, or disruption of email services.

🟢

If Mitigated

Limited impact if patched promptly, but residual risk from delayed patching or misconfigurations.

🌐 Internet-Facing: HIGH, as the vulnerability can be exploited via HTTP requests to internet-facing Exchange servers.
🏢 Internal Only: MEDIUM, as internal attackers or compromised devices could exploit it, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Actively exploited in the wild, with known attack chains combining multiple Exchange vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates for Exchange Server 2013 CU23, 2016 CU19, 2019 CU8, and later cumulative updates.

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26858

Restart Required: Yes

Instructions:

1. Download the security update from Microsoft Update Catalog. 2. Apply the update to all affected Exchange servers. 3. Restart the servers as required. 4. Verify the patch installation via version checks.

🔧 Temporary Workarounds

Block HTTP requests to vulnerable paths

windows

Use IIS URL Rewrite rules to block requests to known vulnerable endpoints like /owa/auth/Current.

Add URL Rewrite rule in IIS Manager to deny requests matching specific patterns.

Restrict network access

windows

Limit inbound HTTP/HTTPS traffic to Exchange servers to trusted IPs only using firewalls.

Configure firewall rules (e.g., via PowerShell: New-NetFirewallRule -DisplayName 'Block Exchange Exploit' -Direction Inbound -Protocol TCP -LocalPort 443 -RemoteAddress '0.0.0.0/0' -Action Block)

🧯 If You Can't Patch

  • Isolate Exchange servers from the internet and restrict internal access to minimize exposure.
  • Implement enhanced monitoring and logging to detect exploitation attempts and respond quickly.

🔍 How to Verify

Check if Vulnerable:

Check Exchange Server version and compare with patched versions; use Microsoft's Exchange Health Checker script.

Check Version:

In PowerShell: Get-ExchangeServer | Select Name, AdminDisplayVersion

Verify Fix Applied:

Verify the installed update via Control Panel or PowerShell (Get-HotFix) and confirm version matches patched releases.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to /owa/auth/Current or similar paths in IIS logs.
  • Unexpected processes or file creations on Exchange servers.

Network Indicators:

  • Suspicious inbound HTTP traffic to Exchange servers from untrusted sources.
  • Anomalous outbound connections from Exchange servers.

SIEM Query:

Example: source="IIS" AND (url="/owa/auth/Current" OR status=500) | stats count by src_ip

🔗 References

📤 Share & Export