<img alt="" src="https://secure.hims1nice.com/151009.png" style="display:none;">
Skip to main content

Active Exploitation of Microsoft Exchange On-Prem Vulnerabilities

Microsoft has recently released a group of updates to prevent attacks on the following vulnerabilities for Exchange ...

Mark McIntosh
Posted by Mark McIntosh
Active Exploitation of Microsoft Exchange On-Prem Vulnerabilities
image-3

In today's fast-paced business landscape, staying ahead of the competition requires efficient and effective solutions. According to Microsoft’s Work Trend Index, nearly 70% of employee report that they don’t have sufficient time in the day to focus on “work”, with more time being spent Communicating than Creating.

Microsoft 365 Copilot is designed, with Microsoft’s cloud trust platform at its core, to allow for employees to both be more productive, reduce the time spent searching for information, performing mundane tasks, and other low-value activities.

Microsoft has recently released a group of updates to prevent attacks on the following vulnerabilities for Exchange on-premises:

CVE-2021-26855 is a server-side request forgery (SSRF) vulnerability in Exchange that allowed the attacker to send arbitrary HTTP requests and authenticate as the Exchange server.

CVE-2021-26857 is an insecure deserialization vulnerability in the Unified Messaging service. Insecure deserialization is where untrusted user-controllable data is deserialized by a program. Exploiting this vulnerability gave HAFNIUM the ability to run code as SYSTEM on the Exchange server. This requires administrator permission or another vulnerability to exploit.

CVE-2021-26858 is a post-authentication arbitrary file write vulnerability in Exchange. If HAFNIUM could authenticate with the Exchange server then they could use this vulnerability to write a file to any path on the server. They could authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin’s credentials.

CVE-2021-27065 is a post-authentication arbitrary file write vulnerability in Exchange. If HAFNIUM could authenticate with the Exchange server then they could use this vulnerability to write a file to any path on the server. They could authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin’s credentials.

Ref: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/

 

The patches that Microsoft has released can only be applied to the following specific versions:

If your server is not on one of these currently supported update versions, you will first need to apply previous updates to your Exchange server to reach the minimum requirement above.

KiZAN can check your servers for evidence of a breach and apply the necessary patches to secure your Exchange environment.

$1300 per update needed, per server

 

Contact Us