diff --git a/docs/advisories/20240424001-Microsoft-Exchange-Server-Remote-Code-Execution-Vulnerability.md b/docs/advisories/20240424001-Microsoft-Exchange-Server-Remote-Code-Execution-Vulnerability.md new file mode 100644 index 000000000..1f72406a7 --- /dev/null +++ b/docs/advisories/20240424001-Microsoft-Exchange-Server-Remote-Code-Execution-Vulnerability.md @@ -0,0 +1,26 @@ +# Microsoft Exchange Server Remote Code Execution Vulnerability - 20240424001 + +## Overview + +Microsoft Exchange Server Remote Code Execution Vulnerability + +## What is vulnerable? + +| CVE | Severity | CVSS | Product(s) Affected | Dated | +| -------------------------------------------------------------------------------------- | ------------- | ---- | --------------------------------- | --------------------------- | +| [CVE-2024-26198](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26198) | **Important** | 7.7 | See vendor link in Recommendation | 12/03/24 (Updated 23/04/24) | + +## What has been observed? + +There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)): + +- [Microsoft Exchange Server Remote Code Execution Vulnerability Recently updated](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-26190) + +## Additional References + +- [Tenable - CVE-2024-26198 + ](https://www.tenable.com/cve/CVE-2024-26198)