HomeCyber BalkansMicrosoft and ZDI have conflicting opinions on Exchange zero-day vulnerabilities

Microsoft and ZDI have conflicting opinions on Exchange zero-day vulnerabilities

Published on

spot_img

There has been a disagreement between Microsoft and Trend Micro’s Zero Day Initiative over a series of zero-day vulnerabilities in Microsoft Exchange, causing confusion about the potential risks of these flaws. Trend Micro’s Zero Day Initiative (ZDI) disclosed four zero-day vulnerabilities in on-premises versions of Microsoft Exchange on November 2. These vulnerabilities include deserialization and remote code execution flaw ZDI-23-1578, server-side request forgery flaw ZDI-23-1581, SSRF flaw ZDI-23-1580, and SSRF flaw ZDI-23-1579. ZDI researcher Piotr Bazydło emphasized the seriousness of the SSRF issues, specifically ZDI-23-1581, in a blog post, where he highlighted that authenticated remote attackers could disclose sensitive information from a target’s Exchange inbox.

When ZDI disclosed the vulnerabilities, Microsoft responded by stating that the company had investigated the issues and concluded that they did not require immediate servicing. Microsoft shared the report with the team responsible for maintaining the product, indicating that potential future fixes would be considered. However, ZDI was not satisfied with this response as it was uncertain when or if the issues would be fixed. As a result, ZDI decided to publish a blog post for all four vulnerabilities, recommending that interactions with the application be restricted as a mitigation strategy.

Regarding one of the vulnerabilities, remote code execution flaw ZDI-23-1578, Microsoft told cybersecurity publication SecurityWeek that it had already been patched via August security updates. However, ZDI felt that Microsoft’s response was misleading because the fix only covered default configurations of Exchange, and the bug report covered non-default configuration scenarios. ZDI’s head of threat awareness, Dustin Childs, expressed concerns that many Exchange servers might still be vulnerable if their admins believed they were safe based on the patch.

Childs also argued that Microsoft downplayed the seriousness of the SSRF bugs, pointing out that they were worth addressing, as many Exchange servers could have compromised users who can authenticate. However, Microsoft responded by stating that the vulnerabilities disclosed by ZDI either did not meet the bar for immediate servicing under their severity classification guidelines or had already been addressed.

In light of these disagreements, Microsoft announced the Secure Future Initiative, a plan to better address software and vulnerability issues. As part of the initiative, Microsoft president Brad Smith emphasized the importance of encouraging more transparent reporting of vulnerabilities across the tech sector.

This disagreement between Microsoft and ZDI comes after months of public criticism of Microsoft’s handling of reported vulnerabilities, particularly in its cloud services. The security community has expressed concerns about Microsoft’s approach to addressing security issues and has been vocal about the need for transparency and consistent reporting in the tech industry.

Overall, the conflicting perspectives on the severity and urgency of the zero-day vulnerabilities in Microsoft Exchange have raised questions about the potential risks and the best methods for addressing them. As the security community continues to advocate for improved transparency and collaboration in addressing vulnerabilities, the industry will be closely monitoring how Microsoft and ZDI navigate these disagreements to ensure the security of users and systems.

Source link

Latest articles

Intel Utility Compromised in AppDomain Attack to Deploy Malware

Hackers are exploiting a trusted Intel utility to silently deploy advanced malware, leveraging the...

What Enterprise AI Leaders Are Doing Right

KPMG Survey Finds Organizations Must Transform Operations to Scale AI A recent survey by KPMG...

Formbook Malware Campaign Employs Various Obfuscation Techniques

Emerging Phishing Campaigns Target Organizations with Stealthy Techniques to Deliver Formbook Malware In a troubling...

Cybersecurity in the Age of AI: Bigger and Faster Threats

Spearheading Cybersecurity in the Age of AI: Insights from SecureWorld Conference At the recent SecureWorld...

More like this

Intel Utility Compromised in AppDomain Attack to Deploy Malware

Hackers are exploiting a trusted Intel utility to silently deploy advanced malware, leveraging the...

What Enterprise AI Leaders Are Doing Right

KPMG Survey Finds Organizations Must Transform Operations to Scale AI A recent survey by KPMG...

Formbook Malware Campaign Employs Various Obfuscation Techniques

Emerging Phishing Campaigns Target Organizations with Stealthy Techniques to Deliver Formbook Malware In a troubling...