SkillAgentSearch skills...

ProxyLogon

ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.

Install / Use

/learn @RickGeex/ProxyLogon
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

ProxyLogon

ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution. (source: proxylogon.com)

Disclaimer

The information provided on this Github repository is for educational purposes only. All information on this Github is provided in good faith, however I make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability, or completeness of any information.

Getting Started

Requirements

  • This script requires the use of Python3 and the urllib library

If you want to test the vulnerability do so on your (non production) systems only

python ProxyLogon.py <hostname> <email>

Screenshot

ProxyLogon

Mitigation

Updates

Cumulative updates

The following security updates are available for the following Microsoft Exchange Server versions:

  • Microsoft Exchange Server 2013 Cumulative Update 23
  • Microsoft Exchange Server 2016 Cumulative Update 18
  • Microsoft Exchange Server 2016 Cumulative Update 19
  • Microsoft Exchange Server 2019 Cumulative Update 7
  • Microsoft Exchange Server 2019 Cumulative Update 8

Source: https://www.ncsc.nl/actueel/nieuws/2021/maart/5/update-microsoft-exchange-server

Other resources (scanners, iocs)

  • https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
  • https://github.com/microsoft/CSS-Exchange/tree/main/Security
  • https://www.fireeye.com/blog/threat-research/2021/03/detection-response-to-exploitation-of-microsoft-exchange-zero-day-vulnerabilities.html
  • https://us-cert.cisa.gov/ncas/alerts/aa21-062a
  • https://news.sophos.com/en-us/2021/03/05/hafnium-advice-about-the-new-nation-state-attack/
  • https://github.com/Neo23x0/signature-base/blob/master/yara/apt_hafnium_log_sigs.yar

Credits

  • Researchers at DEVCORE
  • Testanull (PoC) and the related blog post: https://testbnull.medium.com/ph%C3%A2n-t%C3%ADch-l%E1%BB%97-h%E1%BB%95ng-proxylogon-mail-exchange-rce-s%E1%BB%B1-k%E1%BA%BFt-h%E1%BB%A3p-ho%C3%A0n-h%E1%BA%A3o-cve-2021-26855-37f4b6e06265
View on GitHub
GitHub Stars32
CategoryDevelopment
Updated1mo ago
Forks9

Languages

Python

Security Score

75/100

Audited on Feb 14, 2026

No findings