An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application.

An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website.

Leaked credentials can then be relayed against the Exchange server to gain privileges as the victim client and to perform operations on the Exchange server on the victim’s behalf.

A complete vendor solution is available. Either the vendor has issued an official patch, or an upgrade is available.

Cornerstone.IT