Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-0688
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Exchange Server 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server 中存在授权问题漏洞,该漏洞源于程序无法正确处理内存中的对象。攻击者可借助特制的电子邮件利用该漏洞在系统用户的上下文中运行任意代码。以下产品及版本受到影响:Microsoft Exchange Server 2010,Microsoft Exchange Server 2013,Micro
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
II. Public POCs for CVE-2020-0688
#POC DescriptionSource LinkShenlong Link
1cve-2020-0688https://github.com/random-robbie/cve-2020-0688POC Details
2CVE-2020-0688 - Exchangehttps://github.com/Jumbo-WJB/CVE-2020-0688POC Details
3cve-2020-0688https://github.com/Ridter/cve-2020-0688POC Details
4CVE-2020-0688_EXP Auto trigger payload & encrypt methodhttps://github.com/Yt1g3r/CVE-2020-0688_EXPPOC Details
5Exchange Scanner CVE-2020-0688https://github.com/righter83/CVE-2020-0688POC Details
6I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for thathttps://github.com/truongtn/cve-2020-0688POC Details
7Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.https://github.com/onSec-fr/CVE-2020-0688-ScannerPOC Details
8CVE-2020-0688https://github.com/youncyb/CVE-2020-0688POC Details
9Exploit and detect tools for CVE-2020-0688https://github.com/zcgonvh/CVE-2020-0688POC Details
10PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShellhttps://github.com/justin-p/PSForgot2kEyXCHANGEPOC Details
11Vulnerability scanner for CVE-2020-0688https://github.com/cert-lv/CVE-2020-0688POC Details
12Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"https://github.com/ravinacademy/CVE-2020-0688POC Details
13CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability" https://github.com/mahyarx/Exploit_CVE-2020-0688POC Details
14PoC RCE Reverse Shell for CVE-2020-0688https://github.com/ktpdpro/CVE-2020-0688POC Details
15cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command outputhttps://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-techniquePOC Details
16[CVE-2020-0688] Microsoft Exchange Server Fixed Cryptographic Key Remote Code Execution (RCE)https://github.com/murataydemir/CVE-2020-0688POC Details
17CVE-2020-0688 PoChttps://github.com/zyn3rgy/ecp_slapPOC Details
18Scans for Microsoft Exchange Versions with masscanhttps://github.com/SLSteff/CVE-2020-0688-ScannerPOC Details
19Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keyshttps://github.com/MrTiz/CVE-2020-0688POC Details
20事件: 微軟(Microsoft)上周公布了修補遭到駭客攻擊的 Exchange Server 漏洞,全球恐有數萬個組織受到影響。網域與被入侵的Exchange郵件伺服器有關,而這臺伺服器後來被駭客當作C&C中繼站使用,導致接下來發生加密攻擊事故。 嚴重性: 全球企業普遍使用微軟生態系執行日常業務,若遭受駭客攻擊,將造成用戶機敏資料外洩並導致極大損失。雖然微軟已推出更新補釘,但阿戴爾強調這尚未去除儲存在受害伺服器內的後門殼層(webshell),因此就算尚未受到攻擊的企業可以免於被駭風險,駭客仍有時間入侵已被駭的伺服器留下「定時炸彈」。 從2020年開始,美國便不斷指控中國入侵多家醫藥公司及學術單位,試圖竊取疫苗研發機密,這次事件很可能將使中美之間的關係進一步惡化。至於華為、TikTok等中國服務是否會受到這次駭客事件波及,則暫時還不明朗。 漏洞通報程序: 在2年前,曾經拿下資安圈漏洞奧斯卡獎Pwnie Awards「最佳伺服器漏洞獎」戴夫寇爾首席資安研究員Orange Tsai(蔡政達),漏洞通報記錄不勝枚舉,後來因為針對企業常用的SSL VPN進行漏洞研究與通報,更是在全球資安圈聲名大噪。 不過,在今年3月2日卻發生讓Orange Tsai錯愕不已的事情。那就是,他在今年一月跟微軟通報的2個Exchange漏洞,微軟原訂在3月9日對外釋出修補程式,卻突然提前一週,在3月2日便緊急釋出修補程式。原來是因為,在2月26日到2月28日,這個週五下班後到週末這段期間,全球各地發生許多利用微軟Exchange漏洞發動攻擊的資安事件。 攻擊本質: 有人在網路上大量掃描微軟於本月修補的CVE-2020-0688安全漏洞,該漏洞攸關Microsoft Exchange伺服器,呼籲Exchange用戶應儘速修補。 CVE-2020-0688漏洞肇因於Exchange伺服器在安裝時沒能妥善建立唯一金鑰,將允許具備該知識及信箱的授權用戶以系統權限傳遞任意物件,屬於遠端程式攻擊漏洞,該漏洞影響Microsoft Exchange Server 2010 SP3、Microsoft Exchange Server 2013、Microsoft Exchange Server 2016與Microsoft Exchange Server 2019,但只被微軟列為重要(Important)等級的風險。https://github.com/ann0906/proxylogonPOC Details
21CVE-2020-0688_Microsoft Exchange default MachineKeySection deserialize vulnerabilityhttps://github.com/7heKnight/CVE-2020-0688POC Details
22Exploit updated to use Python 3.https://github.com/1337-llama/CVE-2020-0688-Python3POC Details
23CVE-2020-0688 modified exploit for Exchange 2010 https://github.com/chudamax/CVE-2020-0688-Exchange2010POC Details
24GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)https://github.com/W01fh4cker/CVE-2020-0688-GUIPOC Details
25CVE-2020-0688: Remote Code Execution on Microsoft Exchange Server Through Fixed Cryptographic Keyshttps://github.com/tvdat20004/CVE-2020-0688POC Details
26A deep-dive security analysis into the 2020 Virgin Mobile KSA data breach. This study dissects the exploitation of CVE-2020-0688, evaluates the impact of delayed patch management, and proposes a robust multi-layered defense architecture to prevent sophisticated exfiltration tactics.https://github.com/iamwajd/Cyber-Attack-AnalysisPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-0688
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-0688

No comments yet


Leave a comment