CVE Vulnerabilities

CVE-2023-21709

Improper Restriction of Excessive Authentication Attempts

Published: Aug 08, 2023 | Modified: Aug 10, 2023
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Microsoft Exchange Server Elevation of Privilege Vulnerability

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Exchange_server Microsoft 2016 (including) 2016 (including)
Exchange_server Microsoft 2016-cumulative_update_1 (including) 2016-cumulative_update_1 (including)
Exchange_server Microsoft 2016-cumulative_update_10 (including) 2016-cumulative_update_10 (including)
Exchange_server Microsoft 2016-cumulative_update_11 (including) 2016-cumulative_update_11 (including)
Exchange_server Microsoft 2016-cumulative_update_12 (including) 2016-cumulative_update_12 (including)
Exchange_server Microsoft 2016-cumulative_update_13 (including) 2016-cumulative_update_13 (including)
Exchange_server Microsoft 2016-cumulative_update_14 (including) 2016-cumulative_update_14 (including)
Exchange_server Microsoft 2016-cumulative_update_15 (including) 2016-cumulative_update_15 (including)
Exchange_server Microsoft 2016-cumulative_update_16 (including) 2016-cumulative_update_16 (including)
Exchange_server Microsoft 2016-cumulative_update_17 (including) 2016-cumulative_update_17 (including)
Exchange_server Microsoft 2016-cumulative_update_18 (including) 2016-cumulative_update_18 (including)
Exchange_server Microsoft 2016-cumulative_update_19 (including) 2016-cumulative_update_19 (including)
Exchange_server Microsoft 2016-cumulative_update_2 (including) 2016-cumulative_update_2 (including)
Exchange_server Microsoft 2016-cumulative_update_20 (including) 2016-cumulative_update_20 (including)
Exchange_server Microsoft 2016-cumulative_update_21 (including) 2016-cumulative_update_21 (including)
Exchange_server Microsoft 2016-cumulative_update_22 (including) 2016-cumulative_update_22 (including)
Exchange_server Microsoft 2016-cumulative_update_3 (including) 2016-cumulative_update_3 (including)
Exchange_server Microsoft 2016-cumulative_update_4 (including) 2016-cumulative_update_4 (including)
Exchange_server Microsoft 2016-cumulative_update_5 (including) 2016-cumulative_update_5 (including)
Exchange_server Microsoft 2016-cumulative_update_6 (including) 2016-cumulative_update_6 (including)
Exchange_server Microsoft 2016-cumulative_update_7 (including) 2016-cumulative_update_7 (including)
Exchange_server Microsoft 2016-cumulative_update_8 (including) 2016-cumulative_update_8 (including)
Exchange_server Microsoft 2016-cumulative_update_9 (including) 2016-cumulative_update_9 (including)
Exchange_server Microsoft 2019 (including) 2019 (including)
Exchange_server Microsoft 2019-cumulative_update_1 (including) 2019-cumulative_update_1 (including)
Exchange_server Microsoft 2019-cumulative_update_10 (including) 2019-cumulative_update_10 (including)
Exchange_server Microsoft 2019-cumulative_update_11 (including) 2019-cumulative_update_11 (including)
Exchange_server Microsoft 2019-cumulative_update_2 (including) 2019-cumulative_update_2 (including)
Exchange_server Microsoft 2019-cumulative_update_3 (including) 2019-cumulative_update_3 (including)
Exchange_server Microsoft 2019-cumulative_update_4 (including) 2019-cumulative_update_4 (including)
Exchange_server Microsoft 2019-cumulative_update_5 (including) 2019-cumulative_update_5 (including)
Exchange_server Microsoft 2019-cumulative_update_6 (including) 2019-cumulative_update_6 (including)
Exchange_server Microsoft 2019-cumulative_update_7 (including) 2019-cumulative_update_7 (including)
Exchange_server Microsoft 2019-cumulative_update_8 (including) 2019-cumulative_update_8 (including)
Exchange_server Microsoft 2019-cumulative_update_9 (including) 2019-cumulative_update_9 (including)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References