尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Microsoft Exchange Server 2013 | Cumulative Update 23 | - | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 3 | unspecified | - | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 14 | unspecified | - | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 15 | unspecified | - | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 4 | unspecified | - | |
| Microsoft | Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30 | unspecified | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | cve-2020-0688 | https://github.com/random-robbie/cve-2020-0688 | POC详情 |
| 2 | CVE-2020-0688 - Exchange | https://github.com/Jumbo-WJB/CVE-2020-0688 | POC详情 |
| 3 | cve-2020-0688 | https://github.com/Ridter/cve-2020-0688 | POC详情 |
| 4 | CVE-2020-0688_EXP Auto trigger payload & encrypt method | https://github.com/Yt1g3r/CVE-2020-0688_EXP | POC详情 |
| 5 | Exchange Scanner CVE-2020-0688 | https://github.com/righter83/CVE-2020-0688 | POC详情 |
| 6 | I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that | https://github.com/truongtn/cve-2020-0688 | POC详情 |
| 7 | Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method. | https://github.com/onSec-fr/CVE-2020-0688-Scanner | POC详情 |
| 8 | CVE-2020-0688 | https://github.com/youncyb/CVE-2020-0688 | POC详情 |
| 9 | Exploit and detect tools for CVE-2020-0688 | https://github.com/zcgonvh/CVE-2020-0688 | POC详情 |
| 10 | PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell | https://github.com/justin-p/PSForgot2kEyXCHANGE | POC详情 |
| 11 | Vulnerability scanner for CVE-2020-0688 | https://github.com/cert-lv/CVE-2020-0688 | POC详情 |
| 12 | Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability" | https://github.com/ravinacademy/CVE-2020-0688 | POC详情 |
| 13 | CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability" | https://github.com/mahyarx/Exploit_CVE-2020-0688 | POC详情 |
| 14 | PoC RCE Reverse Shell for CVE-2020-0688 | https://github.com/ktpdpro/CVE-2020-0688 | POC详情 |
| 15 | cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output | https://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique | POC详情 |
| 16 | [CVE-2020-0688] Microsoft Exchange Server Fixed Cryptographic Key Remote Code Execution (RCE) | https://github.com/murataydemir/CVE-2020-0688 | POC详情 |
| 17 | CVE-2020-0688 PoC | https://github.com/zyn3rgy/ecp_slap | POC详情 |
| 18 | Scans for Microsoft Exchange Versions with masscan | https://github.com/SLSteff/CVE-2020-0688-Scanner | POC详情 |
| 19 | Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys | https://github.com/MrTiz/CVE-2020-0688 | POC详情 |
| 20 | 事件: 微軟(Microsoft)上周公布了修補遭到駭客攻擊的 Exchange Server 漏洞,全球恐有數萬個組織受到影響。網域與被入侵的Exchange郵件伺服器有關,而這臺伺服器後來被駭客當作C&C中繼站使用,導致接下來發生加密攻擊事故。 嚴重性: 全球企業普遍使用微軟生態系執行日常業務,若遭受駭客攻擊,將造成用戶機敏資料外洩並導致極大損失。雖然微軟已推出更新補釘,但阿戴爾強調這尚未去除儲存在受害伺服器內的後門殼層(webshell),因此就算尚未受到攻擊的企業可以免於被駭風險,駭客仍有時間入侵已被駭的伺服器留下「定時炸彈」。 從2020年開始,美國便不斷指控中國入侵多家醫藥公司及學術單位,試圖竊取疫苗研發機密,這次事件很可能將使中美之間的關係進一步惡化。至於華為、TikTok等中國服務是否會受到這次駭客事件波及,則暫時還不明朗。 漏洞通報程序: 在2年前,曾經拿下資安圈漏洞奧斯卡獎Pwnie Awards「最佳伺服器漏洞獎」戴夫寇爾首席資安研究員Orange Tsai(蔡政達),漏洞通報記錄不勝枚舉,後來因為針對企業常用的SSL VPN進行漏洞研究與通報,更是在全球資安圈聲名大噪。 不過,在今年3月2日卻發生讓Orange Tsai錯愕不已的事情。那就是,他在今年一月跟微軟通報的2個Exchange漏洞,微軟原訂在3月9日對外釋出修補程式,卻突然提前一週,在3月2日便緊急釋出修補程式。原來是因為,在2月26日到2月28日,這個週五下班後到週末這段期間,全球各地發生許多利用微軟Exchange漏洞發動攻擊的資安事件。 攻擊本質: 有人在網路上大量掃描微軟於本月修補的CVE-2020-0688安全漏洞,該漏洞攸關Microsoft Exchange伺服器,呼籲Exchange用戶應儘速修補。 CVE-2020-0688漏洞肇因於Exchange伺服器在安裝時沒能妥善建立唯一金鑰,將允許具備該知識及信箱的授權用戶以系統權限傳遞任意物件,屬於遠端程式攻擊漏洞,該漏洞影響Microsoft Exchange Server 2010 SP3、Microsoft Exchange Server 2013、Microsoft Exchange Server 2016與Microsoft Exchange Server 2019,但只被微軟列為重要(Important)等級的風險。 | https://github.com/ann0906/proxylogon | POC详情 |
| 21 | CVE-2020-0688_Microsoft Exchange default MachineKeySection deserialize vulnerability | https://github.com/7heKnight/CVE-2020-0688 | POC详情 |
| 22 | Exploit updated to use Python 3. | https://github.com/1337-llama/CVE-2020-0688-Python3 | POC详情 |
| 23 | CVE-2020-0688 modified exploit for Exchange 2010 | https://github.com/chudamax/CVE-2020-0688-Exchange2010 | POC详情 |
| 24 | GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability) | https://github.com/W01fh4cker/CVE-2020-0688-GUI | POC详情 |
| 25 | CVE-2020-0688: Remote Code Execution on Microsoft Exchange Server Through Fixed Cryptographic Keys | https://github.com/tvdat20004/CVE-2020-0688 | POC详情 |
| 26 | A deep-dive security analysis into the 2020 Virgin Mobile KSA data breach. This study dissects the exploitation of CVE-2020-0688, evaluates the impact of delayed patch management, and proposes a robust multi-layered defense architecture to prevent sophisticated exfiltration tactics. | https://github.com/iamwajd/Cyber-Attack-Analysis | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论