Microsoft adds mitigations to Exchange Server hacks

Microsoft adds mitigations to Exchange Server hacks

Microsoft adds mitigations to Exchange Server hacks × Follow Us Create Notifications New User posted their first comment this is comment text Link Approve Reject & ban Delete Log in Manage your profile Editing Story Queue Video Queue Editing Stats Writer Home SEO Redirection Admin Gaming Wiki Edits Taxonomy Home Edit Site Menu Mapping Dashboard Tag Pages Community Social Feed Queue Feed Center Notification Center Affiliate Home Manage Pages Bottom Tagline Dash Timeless Stories Logout Gaming Tech News Microsoft adds more mitigations to Exchange Server vulnerabilities as attackers ravage the exploits By Arka Mukherjee Modified 04 Oct 2022 Follow Us Comment Share The Microsoft Exchange Server logo (Image via Microsoft) The Microsoft Exchange Server CVE-2022-41040 and CVE-2022-41082 vulnerabilities surfaced a few days back and the company has already confirmed that attackers are exploiting these zero-day issues. The security team at the Redmond-based tech establishment is yet to solve these bypasses in the code, which were first confirmed on September 29. Before the company comes up with a fruitful fix to the discovery exploits, the team is rolling out a few mitagations as part of their customer guidance program to slow down the attackers' progress. On October 2, the security team passed out a mitigation urging Microsoft Exchange Server users to disable remote PowerShell access for non-admin users. Apart from this, the company has also rolled out a URL Rewrite mitigation and other options that could break the attack chains adopted by the hackers. What are the Microsoft Exchange Server vulnerabilities and whom are they currently affecting ReconOne@ReconOne_bk[Oh noo] Two new #0day vulnerabilities affecting Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) exploited in the wildHow to search for it at mass scale #exchange #microsoft #recon #AttackSurface #bugbountytips #bugbounty #cve2022 #ProxyNotShell #rce9338[Oh noo] Two new #0day vulnerabilities affecting Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) exploited in the wildHow to search for it at mass scale #exchange #microsoft #recon #AttackSurface #bugbountytips #bugbounty #cve2022 #ProxyNotShell #rce https://t.co/NobzbFXPsi The reported vulnerabilities have been spotted in Microsoft Exchange Server 2019, 2016, and 2013. The first among the two exploits, the CVE-2022-41040 is a Server-Side Request Forgery (SSRF) issue. THe Microsoft security team has identified the other vulnerability, CVE-2022-41082, as a Remote Code Execution (RCE) issue. This exploit allows attackers to remotely gain keyboard access as it unlocks the PowerShell. The first exploit can be used to initiate the second vulnerability. On the bright side, however, the attacks need to have authenticated access to the Exchange Server. Unfortunately, authenticated access can be gained via phishing attacks and brute-force servers. Profiles with such access are also available for purchase on underground hacker forums on the dark web. The security team is still working on a patch to solve the potential vulnerabilities. In a blog post, the Security Response Center at Microsoft said the following: "Microsoft Exchange Online has detections and mitigations to protect customers. As always, Microsoft is monitoring these detections for malicious activity and we’ll respond accordingly if necessary to protect customers." Who needs to take the steps to prevent attackers from stealing critical information ToolsWatch - Cyber Security Tools Events Organizer@ToolsWatch2 #0day vulnerabilities (known as #ProxyNotShell) affecting Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) being exploited in the wild !Patch must be deployed ASAP !Here are our IoVs (Indicators of Vulnerability) (fixes, IPS rules, exploits, Nuclei templates ...)42 #0day vulnerabilities (known as #ProxyNotShell) affecting Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) being exploited in the wild !Patch must be deployed ASAP !Here are our IoVs (Indicators of Vulnerability) (fixes, IPS rules, exploits, Nuclei templates ...) https://t.co/Ggbu1kG2bW Before Microsoft releases a patch to resolve the issue, users will have to manually apply some of the mitigations outlined by the MSRC to stop probable attacks. The company has confirmed that they are working on an active fix and applying the mitigations will have no effect on the normal functioning of the services. The steps on how to apply these fixes are outlined in a blog post from the MSRC team. The team is constantly updating the post with new mitigations, updates, and instructions regarding the issue. However, it is worth noting that Exchange Online customers do not have to take any action; they can continue with regular usage. The discovered Exchange Server vulnerabilities are quite dangerous, to say the least. Microsoft should work and implement a patch as soon as possible. Poll : 0 votes Quick Links More from Sportskeeda Edited by Abu Amjad Khan × Feedback Thank You! Be the first one to comment Follow Us Share Show More Comments GIF Comment in moderation 0 0 Reply x Edit Delete Delete the comment? No thanks Delete GIF Cancel Update GIF Cancel Reply ❮ ❯ GIF Comment in moderation 0 0 Reply x Edit Delete Delete the comment? No thanks Delete GIF Cancel Update GIF Cancel Reply ❮ ❯ Be the first one to comment on this story More from Sportskeeda Fetching more content... 1 Manage your profile Editing Story Queue Video Queue Editing Stats Writer Home SEO Redirection Admin Gaming Wiki Edits Taxonomy Home Edit Site Menu Mapping Dashboard Tag Pages Community Social Feed Queue Feed Center Notification Center Affiliate Home Manage Pages Bottom Tagline Dash Timeless Stories Logout No Results Found Get the free App now Manage notifications Popular ‍ Sports (30+) CricketCricket HomeCricket NewsScheduleIND vs SAAUS vs WIENG vs PAKLegends LeagueECC T10County ChampionshipBukhatir LeagueNZ T20 Tri-SeriesWomen's Asia Cup 2022Japan Cricket LeagueWI-W vs NZ-WECT10T20 World Cup FootballFootball HomeNewslettersSK Experts ScheduleEPLNations LeagueLa LigaLigue 1Champions LeagueFIFA WCMLS Bundesliga Serie A WWEWWE HomeNewslettersRumor RoundupRAWSmackDownResultsRosterChampionsWWE Extreme Rules 2022PPV ScheduleAEW EsportsEsports HomeMinecraftOverwatch 2RobloxGenshin ImpactFortniteGTAStreamersFree FirePUBGValorantBGMIPop CultureAnimeGaming TechWiki Guides TennisTennis HomeTennis calendarChina OpenTennis Results TodayATP RankingsWTA RankingsRoger FedererRafael NadalNovak DjokovicSerena Williams MMAMMA HomeUFC NewsONE ChampionshipUFC Fight NightScheduleRankingsResultsUFC Fights TonightONE Championship ResultsONE Championship ScheduleONE Championship Rankings KabaddiKabaddi HomePKL 2022PKL SchedulePKL Points TableKabaddi Rules WikiWiki HomeMinecraft WikiNaruto WikiTikTok WikiYoutube WikiGTA WikiTerraria WikiOne Piece Wiki MoreSportsBasketballIndian FootballNFLMinecraftFormula 1NascarPop CultureCollege FootballHockeyGolfAthleticsBadmintonGymnasticsWrestlingSwimmingTennisShootingBoxingArcheryWinter SportsRobloxSkateboardingKho KhoLifestyle LINKS About Us Write For Us Policies Editorial Standards Journalism Awards Fact Check Affiliate Program Careers CSR Privacy Policy Contact Us Edition: English हिन्दी
Share:
0 comments

Comments (0)

Leave a Comment

Minimum 10 characters required

* All fields are required. Comments are moderated before appearing.

No comments yet. Be the first to comment!

Microsoft adds mitigations to Exchange Server hacks | Trend Now | Trend Now