CVE-2023-21529
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
14/02/2023
Last modified:
14/04/2026
Description
Microsoft Exchange Server Remote Code Execution Vulnerability
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21529
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-21529
- https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/



