CVE-2020-16875
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
11/09/2020
Last modified:
23/02/2026
Description
A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.<br />
An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.<br />
The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.
Impact
Base Score 3.x
8.40
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875
- http://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtils-AddTenantDlpPolicy-Remote-Code-Execution.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875



