HomeCII/OTZero-Day Bug Exploits Microsoft Exchange Server Flaw

Zero-Day Bug Exploits Microsoft Exchange Server Flaw

Published on

spot_img

Microsoft has recently identified and raised concern regarding one of the critical vulnerabilities in Exchange Server, a piece of email software used by many organizations. What was initially flagged as a critical severity bug (9.1 on the 10-point CVSS scale), was later revised to be a zero-day threat with potential active exploitation by attackers. The vulnerability, CVE-2024-21410, is an elevation of privilege vulnerability that allows remote, unauthenticated attackers to access Windows NT Lan Manager (NTLM) hashes, essentially allowing them to pose as legitimate users on Exchange Server.

Microsoft had initially addressed the bug in a Patch Tuesday update, releasing a fix on February 13. However, the company revised its advisory for the flaw on the 14th, stating that they had observed exploit activity in the wild. The company’s revision makes CVE-2024-21410 one of three zero-day bugs that Microsoft has disclosed this month, with the others being CVE-2024-21412 and CVE-2024-21351.

CVE-2024-21410 poses a risk to Exchange Server 2019 specifically, as versions prior to the February 13 update do not enable NTLM relay protections by default. Microsoft has released a cumulative update that rectifies this, providing users with protection. Attackers are likely to find a significant number of vulnerable Exchange Servers to target and are likely to find and exploit vulnerable systems with little difficulty.

Organizations using previous versions of Exchange Server 2019 will need to ensure that they have activated Extended Protection for Authentication (EPA) alongside installing the latest cumulative update. It is also advised to pay careful attention to the details regarding the update, as there are specific scenarios and system configurations where enabling Extended Protection may not be supported and may disrupt existing functionality.

The use of the pass-the-hash method for lateral movement purposes is quite common among attackers. This method involves stealing a user’s NTLM hash from one computer and using it to access another system without having the user’s password. This tactic was utilized by Russia’s Fancy Bear APT group in 2023 in a series of information-stealing attacks.

In light of this new threat, organizations are urged to review the newly identified zero-day vulnerability and take appropriate actions to update their Exchange Server security to protect against potential exploits. As with any security update, thorough testing is advised prior to implementation to ensure that the update does not disrupt existing operations. It’s also vital for administrators to be aware of the potential impact of deploying such patches and to take necessary precautions to safeguard their systems.

Source link

Latest articles

Myth or Mythos: The Illusion of Advantage in the AI Cybersecurity Race

Debate Erupts Over Cybersecurity as Anthropic Mythos Platform Advances Machine-Learning Technology The launch of the...

Hackers Use Pastebin PowerShell Script to Hijack Telegram Sessions

Hackers have recently been observed testing a novel Telegram-focused session stealer, which is embedded...

Google Drafts AI Agents Enhance Security Against AI Hackers

Wiz, AI-BOMs, and Securing the AI Development Landscape In a significant move to enhance its...

UNC6692 Impersonates IT Helpdesk on Microsoft Teams to Deploy SNOW Malware

Microsoft Teams Exploited by Threat Group UNC6692 in Sophisticated Malware Attack A newly discovered threat...

More like this

Myth or Mythos: The Illusion of Advantage in the AI Cybersecurity Race

Debate Erupts Over Cybersecurity as Anthropic Mythos Platform Advances Machine-Learning Technology The launch of the...

Hackers Use Pastebin PowerShell Script to Hijack Telegram Sessions

Hackers have recently been observed testing a novel Telegram-focused session stealer, which is embedded...

Google Drafts AI Agents Enhance Security Against AI Hackers

Wiz, AI-BOMs, and Securing the AI Development Landscape In a significant move to enhance its...