Latest Daily News Hosting, Technology News, Updates, and Trends
Latest Daily News Hosting, Technology News, Updates, and Trends
  • Home
  • News Categories
    • Cyber Security
    • Cloud Hosting
    • Data Center
    • WordPress
    • Search Engine Ranking
    • cPanel Hosting
    • CDN Hosting
    • Press Release
    • WordPress.org-Wp Engine Battle
    • World
  • Web Stories
 Microsoft Claims Two New Exchange Zero-Day Vulnerabilities Are Being Actively Targeted, But There Is No Fast Solution
World

Microsoft Claims Two New Exchange Zero-Day Vulnerabilities Are Being Actively Targeted, But There Is No Fast Solution

by Manvinder Singh October 3, 2022 0 Comment

Nearly two years after similar assaults on the email server software hit a wide variety of enterprises, two zero-day vulnerabilities in Microsoft Exchange Server are being targeted in the market. 

Microsoft acknowledged in a blog post-Thursday night that it was examining alleged Exchange Server vulnerabilities and was “aware of limited targeted assaults.” While the software giant is still working on zero-day security updates, it has provided mitigating techniques for on-premises clients. 

CVE-2022-41040 is assigned to the server-side request forgery flaw (SSRF), while CVE-2022-41082 is related to the remote code execution (RCE) vulnerability. Attackers are chaining the vulnerabilities to access users’ systems, similar to the ProxyShell vulnerabilities in Exchange Server reported last year, however, they only impact Microsoft Exchange Servers 2013, 2016, and 2019. 




“CVE-2022-41040 enables an authenticated attacker to remotely trigger CVE-2022-41082 in these attacks. It should be highlighted that in order to properly exploit any of the two vulnerabilities, authorized access to the susceptible Exchange Server is required “The blog post was written by the Microsoft Security Response Center. 

Furthermore, Microsoft stated that effective attacks require PowerShell access. 

While no solution is presently available, Microsoft recommends that clients use URL Rewrite instructions to prevent the exploitation chain and to block exposed remote PowerShell ports. According to the site, blocking certain ports can prevent authorized attackers with PowerShell access from exploiting the RCE bug. 

TechTarget Editorial requested more comments from Microsoft, but the firm declined and referred to the blog article. 

Even when a fix is available, previous issues with Exchange Servers demonstrated that corporations are slow to patch, which can have disastrous implications. 

ProxyLogon Similarities

GTSC, a Vietnamese cybersecurity firm, discovered the weakness last month while doing incident response services. When researchers realized the bug was severe owing to its RCE nature, GTSC reported it to the Zero Day Initiative (ZDI), which categorized it as two separate CVEs with CVSS scores of 6.6 and 8.8. 




The issues were reported to ZDI by GTSC on September 8, prior to the current zero-day attacks. However, the cybersecurity firm disclosed the information in a blog post on Thursday after seeing exploitation activities against clients in the wild. 

The chronology is comparable to ProxyLogon, a group of four vulnerabilities that plagued Exchange servers last year. The weaknesses allowed threat actors to access email accounts and, more importantly, to retain a long-term presence on victim systems via backdoors. 

Exploitation began in both cases after the vulnerabilities were identified but before they were publicly acknowledged and corrected. In the instance of ProxyLogon, threat actors, including a Chinese nation-state outfit known as Hafnium, exploited zero-day vulnerabilities before Microsoft published security updates. It is possible that 60,000 or more Exchange Servers were exposed. 




Furthermore, Chinese threat actors have been linked to the current zero days. According to GTSC, it tracked a trail of primarily obfuscated web shells to AntSword, “an active Chinese-based open-source cross-platform website management tool,” which led to more investigation. 

“The webshell codepage is 936, which is a Microsoft character encoding for simplified Chinese,” GTSC noted in a blog post. 

Kevin Beaumont, an independent security researcher, detailed further similarities on Twitter and in a blog post Thursday, referring to the issues as “ProxyNotShell.” He acknowledged that “large numbers of Exchange servers – including a honeypot – had been backdoored.” Beaumont also noted other ProxyShell parallels, including the route and the identical SSRF/RCE chain, except that the most current issues need authentication. 




Another commonality he discovered was the request string, which mirrors ProxyShell from 2021. “It appears the ProxyShell patches from early 2021 did not fix the issue,” Beaumont wrote in the blog, adding that the mitigation for the current zero days is the same as the ProxyShell PowerShell RCE issue. 

Additionally, he questioned Microsoft’s mitigation, which said that Exchange Online subscribers are not required to take any action. “Even if you’re Exchange Online, you’re impacted if you moved and retained a hybrid server (a necessity until very recently),” Beaumont wrote on Twitter. 



Previous post
Next post

Manvinder Singh (Website)

author

Manvinder Singh, with 15 years in the web hosting industry, now shares his expertise as a news auditor, enriching web hosting users with valuable insights and guidance. His extensive experience spans server management, security protocols, and customer support, making him a trusted source in navigating the complexities of web hosting solutions. Passionate about transparency and reliability, Manvinder continues to empower businesses and individuals with practical knowledge, ensuring they make informed decisions in optimizing their online presence.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent News

  • CITRA to Sign Lease Contract with Google to Establish Three Data Centers  
  • Last Algorithm Update of 2024; Google Rolls Out December Core Update
  • WP Engine Scores Legal Win Against Automattic
  • Search Engine Update: Google Resolved Indexing Issues
  • Google Asks US Government to Break Up Microsoft’s Cloud Deal with Open AI

Recent Comments

No comments to show.

Archives

  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • October 2022
  • September 2022
  • August 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021

Categories

  • Cloud Hosting
  • cPanel Hosting
  • Cyber Security
  • Data Center
  • Press Release
  • Search Engine Ranking
  • WordPress
  • WordPress.org-Wp Engine Battle
  • World

About Hosting Daily News

Hosting Daily news primarily focuses on delivering quality and authentic content related to the hosting industry. Hosting Daily News covers a wide range of news, articles, announcements, community-based content to keep the tech enthusiasts engaged with the latest development of hosting industry which includes Cloud Hosting, Web Hosting, cybersecurity, WordPress, AI technology and various topics related to hosting. We aim to foster collaborations and knowledge sharing content among industry stakeholders.

Top Categories

  • Cloud Hosting
  • cPanel Hosting
  • Cyber Security
  • Data Center
  • Press Release
  • Search Engine Ranking
  • WordPress
  • WordPress.org-Wp Engine Battle
  • World

Latest News

  • CITRA to Sign Lease Contract with Google to Establish Three Data Centers  
  • Last Algorithm Update of 2024; Google Rolls Out December Core Update
  • WP Engine Scores Legal Win Against Automattic
  • Search Engine Update: Google Resolved Indexing Issues
  • Google Asks US Government to Break Up Microsoft’s Cloud Deal with Open AI
Copyright © 2025 HostingDailyNews. All Right Reserved.
  • Instagram
  • Facebook
  • X
  • LinkedIn