{"vulnerability": "CVE-2021-28481", "sightings": [{"uuid": "5d348fc8-e707-45c6-a999-9da38d181a60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28481", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mf5y3sepvk2h", "content": "", "creation_timestamp": "2026-02-18T21:03:05.774174Z"}, {"uuid": "4467ff5c-8e76-4ba8-99fe-b633146ec1fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-28481", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_11/21", "content": "", "creation_timestamp": "2021-04-15T06:06:29.000000Z"}, {"uuid": "a25c0e46-9473-4acc-983c-5e3667c655d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28481", "type": "exploited", "source": "https://t.me/cKure/4840", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Microsoft today\u00a0issued fixes for 114 vulnerabilities as part of its monthly security update release, which this month addressed 19 critical flaws, four critical Microsoft Exchange Server bugs found by the National Security Agency (NSA), and one zero-day bug in Desktop Window Manager.\n\u00a0\nCVE-2021-28310, a Win32k elevation of privilege vulnerability, is the only CVE under active attack patched this month.\n\nYesterday's patches also addressed four critical remote code execution vulnerabilities in Microsoft Exchange Server:\u00a0CVE-2021-28480,\u00a0CVE-2021-28481,\u00a0CVE-2021-28482, and\u00a0CVE-2021-28483. All of these were discovered by the NSA and affect Exchange Server versions 2013 through 2019.\nCVE-2021-28480 and CVE-2021-28481 have a CVSS score of 9.8 and require no authorization or user interaction to exploit.", "creation_timestamp": "2021-04-14T04:19:35.000000Z"}, {"uuid": "1ad92d11-2878-462c-8daa-ebe7091fd71e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28481", "type": "seen", "source": "https://t.me/alexmakus/4025", "content": "\u0421\u0432\u0435\u0436\u0438\u0435 \u043f\u0430\u0442\u0447\u0438 \u043f\u043e\u0434\u044a\u0435\u0445\u0430\u043b\u0438 \u0434\u043b\u044f Exchange \n\nhttps://techcommunity.microsoft.com/t5/exchange-team-blog/released-april-2021-exchange-server-security-updates/ba-p/2254617\n\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28480\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28481\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28482\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28483\n\n\u0434\u0430\u0436\u0435 \u043d\u0435\u043c\u043d\u043e\u0433\u043e \u0436\u0430\u043b\u043a\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 Exchange, \u044d\u0442\u043e\u0442 \u0433\u043e\u0434 \u0443 \u043d\u0438\u0445 \u043d\u0435 \u0437\u0430\u0434\u0430\u043b\u0441\u044f.", "creation_timestamp": "2021-04-13T19:02:10.000000Z"}, {"uuid": "d6ba6d86-8080-4a6b-a696-0650f5885e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28481", "type": "seen", "source": "https://t.me/CyberSecurityIL/3224", "content": "\u05d4-NSA \u05de\u05d3\u05d5\u05d5\u05d7\u05d9\u05dd \u05db\u05d9 \u05de\u05e6\u05d0\u05d5 \u05de\u05e1\u05e4\u05e8 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05d1\u05e9\u05e8\u05ea\u05d9 Exchange, \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05d4\u05d5\u05e6\u05d9\u05d0\u05d4 \u05e2\u05d3\u05db\u05d5\u05df \u05d3\u05d7\u05d5\u05e3 \u05dc\u05de\u05e9\u05ea\u05de\u05e9\u05d9\u05dd.\n\n\u05dc\u05e4\u05d9 \u05d4\u05e4\u05e8\u05e1\u05d5\u05dd \u05d4-NSA \u05d3\u05d9\u05d5\u05d5\u05d7\u05d5 \u05dc\u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05e2\u05dc 4 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05de\u05e6\u05d0\u05d5 \u05d4\u05de\u05d0\u05e4\u05e9\u05e8\u05d5\u05ea \u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05e2\u05dc \u05e9\u05e8\u05ea\u05d9 Exchange 2013-2019.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05d4\u05ea\u05d2\u05dc\u05d5 \u05e7\u05d9\u05d1\u05dc\u05d5 \u05d0\u05ea \u05de\u05e1\u05e4\u05e8\u05d9 \u05d4\u05de\u05e2\u05e7\u05d1 \u05d4\u05d1\u05d0\u05d9\u05dd:\n\nCVE-2021-28480\nCVE-2021-28481\nCVE-2021-28482\nCVE-2021-28483\n\n\u05db\u05d0\u05de\u05d5\u05e8, \u05e2\u05d3\u05db\u05d5\u05df \u05d3\u05d7\u05d5\u05e3 \u05d9\u05e6\u05d0 \u05d4\u05d9\u05d5\u05dd \u05de\u05d7\u05d1\u05e8\u05ea \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05d4\u05e1\u05d5\u05d2\u05e8 \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea.\n\nhttps://t.me/CyberSecurityIL/915", "creation_timestamp": "2021-04-14T00:12:17.000000Z"}, {"uuid": "680f9155-2e2b-46e8-a0a2-c6c53018a112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28481", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3159", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 12-18)\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-1647 - MS Defender RCE Vulnerability\nhttps://www.anquanke.com/post/id/231625\nCVE-2021-28310 - Win32k Elevation of Privilege Vulnerability\nhttps://t.me/cybersecuritytechnologies/3124\nCVE-2021-24027 - Remote exploitation of a man-in-the-disk vulnerability in WhatsApp\nhttps://t.me/cybersecuritytechnologies/3126\nCVE-2021-28480/28481/28482/28483 - MS Exchange Server RCE Vulnerability\nhttps://www.tenable.com/blog/cve-2021-28480-cve-2021-28481-cve-2021-28482-cve-2021-28483-four-critical-microsoft-exchange\nCVE-2021-28316 - Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability\nhttps://t.me/cybersecuritytechnologies/3156", "creation_timestamp": "2021-04-19T11:01:18.000000Z"}, {"uuid": "a91a061f-af68-4b23-931f-8ba54c80ac23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-28481", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3279", "content": "#Analytics\nTop 10 Most Used Vulnerabilities of the Month (April 1-30)\n\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-22893 Pulse SecureVPN RCE\nhttps://t.me/cybersecuritytechnologies/3185\nCVE-2021-28310 - Win32k EoP Vulnerability\nhttps://t.me/cybersecuritytechnologies/3124\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-22204 - DjVu improper neutralization of user data\nhttps://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800\nCVE-2021-24027 - Remote exploitation of a man-in-the-disk vulnerability in WhatsApp\nhttps://t.me/cybersecuritytechnologies/3126\nCVE-2021-28316 - Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability\nhttps://t.me/cybersecuritytechnologies/3156\nCVE-2021-28480/28482 - MS Exchange Server RCE\nhttps://www.tenable.com/blog/cve-2021-28480-cve-2021-28481-cve-2021-28482-cve-2021-28483-four-critical-microsoft-exchange", "creation_timestamp": "2024-04-30T17:11:44.000000Z"}]}