Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

691+ Articles
119+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability
SECURITYHIGHCVE-2023-21529

CVE-2023-21529: Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability

Microsoft Exchange Server contains a deserialization of untrusted data vulnerability added to CISA's Known Exploited Vulnerabilities catalog in April 2026. Authenticated attackers can exploit the MultiValuedProperty class to achieve remote code execution on Exchange Server 2013, 2016, and 2019.

Dylan H.

Security Team

April 13, 2026
5 min read

Affected Products

  • Microsoft Exchange Server 2013 Cumulative Update 23
  • Microsoft Exchange Server 2016 Cumulative Update 23
  • Microsoft Exchange Server 2019 Cumulative Update 11
  • Microsoft Exchange Server 2019 Cumulative Update 12

Executive Summary

A deserialization of untrusted data vulnerability (CVE-2023-21529) in Microsoft Exchange Server allows an authenticated attacker to achieve remote code execution (RCE) on the target server. The flaw was patched in February 2023 but has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog in April 2026, indicating continued active exploitation against unpatched systems.

CVSS Score: 8.8 (High) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exchange Server remains a high-value target for nation-state actors, ransomware operators, and financially motivated threat groups. Organizations running unpatched Exchange installations should treat this as an immediate remediation priority.


Vulnerability Overview

AttributeValue
CVE IDCVE-2023-21529
CVSS Score8.8 (High)
TypeDeserialization of Untrusted Data
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow (valid Exchange credentials)
User InteractionNone
ScopeUnchanged
C / I / A ImpactHigh / High / High
PublishedFebruary 14, 2023
PatchKB5023038
KEV AddedApril 2026

Affected Products

ProductVulnerable VersionsPatched Version
Exchange Server 2013Cumulative Update 23 and earlierApply KB5023038
Exchange Server 2016Cumulative Update 23Apply KB5023038
Exchange Server 2019Cumulative Update 11, CU12CU11 SU10 / CU12 SU6

Technical Details

The Deserialization Root Cause

The vulnerability resides in the MultiValuedProperty class within Exchange Server's managed code. This class was permitted on the deserialization allow-list but lacked sufficient validation of untrusted data, enabling attackers to craft a malicious deserialization payload that bypasses standard sanitization mechanisms.

Attack Chain

1. Attacker obtains valid Exchange user credentials
   (via credential stuffing, phishing, or prior compromise)
2. Attacker sends a crafted HTTP request to an Exchange endpoint
   that triggers the MultiValuedProperty deserialization path
3. Malicious deserialization payload is processed without sanitization
4. Exchange Server deserializes attacker-controlled data
5. Code execution achieved with Exchange Server process privileges (SYSTEM)
6. Attacker can install webshells, exfiltrate email data, or pivot further

Why Authentication Doesn't Fully Mitigate Risk

While this vulnerability requires low-privilege authentication, Exchange credentials are routinely stolen through:

  • Phishing campaigns targeting Exchange users
  • Credential stuffing from leaked password databases
  • Pass-the-hash / pass-the-ticket attacks from adjacent compromised hosts
  • Password spraying against Outlook Web Access (OWA)

A single compromised Exchange account is sufficient to trigger this vulnerability, making it highly relevant in post-initial-access scenarios common to ransomware and espionage operations.


Impact Assessment

Impact AreaDescription
Remote Code ExecutionFull code execution on the Exchange Server as SYSTEM
Email Data ExfiltrationAccess to all mailboxes on the Exchange organization
Webshell DeploymentPersistent access via server-side webshells
Lateral MovementExchange servers have broad AD trust — ideal pivot point
Ransomware StagingExchange breach frequently precedes domain-wide ransomware
Credential HarvestingExchange credentials and cached authentication tokens

Recommendations

Immediate Patching

  1. Apply KB5023038 — Install the February 2023 cumulative update for your Exchange version
  2. Verify installation — Confirm the update applied via Get-ExchangeDiagnosticInfo
  3. Prioritize internet-facing Exchange — OWA/EWS exposed to the internet is highest risk

Exchange Version Upgrade Paths

Exchange 2016 CU23 → Apply KB5023038 (SU6)
Exchange 2019 CU11 → Apply CU11 SU10
Exchange 2019 CU12 → Apply CU12 SU6
Exchange 2013      → Urgent: Exchange 2013 reached end of support April 2023

Hardening Recommendations

  1. Restrict OWA access by IP if external access is not required
  2. Enable Extended Protection for Authentication (EPA) on all Exchange virtual directories
  3. Implement MFA on all Exchange/Outlook accounts — reduces credential abuse risk
  4. Monitor Exchange IIS logs for anomalous POST requests to EWS/OWA endpoints
  5. Deploy AMSI integration — Exchange 2016/2019 supports AMSI for scanning scripts

Detection Indicators

IndicatorDescription
Unusual POST requests to /EWS/Exchange.asmxPotential exploitation attempt
Unexpected process spawning from w3wp.exeWebshell or code execution activity
New .aspx files created in Exchange directoriesWebshell deployment
Outbound connections from Exchange to unusual IPsC2 beaconing post-exploitation
Exchange logs showing authenticated access from unexpected countriesCompromised credentials

Post-Remediation Checklist

  1. Confirm patch version — Run Get-ExchangeDiagnosticInfo -Server <name> -Process EdgeTransport -Component ResourceThrottling
  2. Audit IIS logs for suspicious activity before patch date
  3. Scan Exchange directories for unauthorized .aspx webshells
  4. Review authentication logs for anomalous access patterns
  5. Rotate service account passwords associated with Exchange
  6. Check for unauthorized inbox rules or mail forwarding rules across mailboxes
  7. Enable and review audit logging for all Exchange administrator actions

References

  • NIST NVD — CVE-2023-21529
  • Microsoft MSRC — CVE-2023-21529
  • Microsoft KB5023038 Security Update
  • CISA Known Exploited Vulnerabilities Catalog
#Vulnerability#CVE#Microsoft#CISA KEV#Exchange Server#Deserialization#RCE

Related Articles

CVE-2026-21643: Fortinet SQL Injection Vulnerability

CISA adds CVE-2026-21643 to the Known Exploited Vulnerabilities catalog. Fortinet FortiClient EMS contains a SQL injection flaw allowing unauthenticated remote code execution via crafted HTTP requests.

3 min read

CVE-2012-1854: Microsoft Visual Basic for Applications Insecure Library Loading

Microsoft VBA contains an insecure library loading (DLL hijacking) vulnerability added to CISA's Known Exploited Vulnerabilities catalog in April 2026. Affecting Office 2003 through 2010, attackers deliver malicious DLLs via crafted documents to achieve local privilege escalation and code execution.

5 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual...

4 min read
Back to all Security Alerts