By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
CryptoCommunityCryptoCommunity
  • Home
  • General
  • Blockchain
  • Crypto
  • DeFi
  • Metaverse
  • NFT
Search
  • BTC
  • ETH
  • USDT
  • USDC
  • BNB
  • BUSD
  • ADA
  • XRP
  • SOL
  • DOGE
  • DOT
  • MATIC
Reading: Microsoft says two new Exchange zero-day bugs under active attack, but no immediate fix
Share
Aa
CryptoCommunityCryptoCommunity
Aa
  • Home
  • General
  • Blockchain
  • Crypto
  • DeFi
  • Metaverse
  • NFT
Search
  • Home
  • General
  • Blockchain
  • Crypto
  • DeFi
  • Metaverse
  • NFT
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
CryptoCommunity > Blog > General > Microsoft says two new Exchange zero-day bugs under active attack, but no immediate fix
General

Microsoft says two new Exchange zero-day bugs under active attack, but no immediate fix

admin Published September 30, 2022
Last updated: 2022/09/30 at 6:22 PM
Share
SHARE

[ad_1]

Microsoft has confirmed two unpatched Exchange Server zero-day vulnerabilities are being exploited by cybercriminals in real-world attacks.

Vietnamese cybersecurity company GTSC, which first discovered the flaws part of its response to a customer’s cybersecurity incident, in August 2022, said the two zero-days have been used in attacks on their customers’ environments dating back to early-August 2022.

Microsoft’s Security Response Center (MRSC) said in a blog post late on Thursday that the two vulnerabilities were identified as CVE-2022-41040, a server-side request forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution on a vulnerable server when PowerShell is accessible to the attacker.

“At this time, Microsoft is aware of limited targeted attacks using the two vulnerabilities to get into users’ systems,” the technology giant confirmed.

Microsoft noted that an attacker would need authenticated access to the vulnerable Exchange Server, such as stolen credentials, to successfully exploit either of the two vulnerabilities, which impact on-premise Microsoft Exchange Server 2013, 2016 and 2019.

Microsoft hasn’t shared any further details about the attacks and declined to answer our questions. Security firm Trend Micro gave the two vulnerabilities severity ratings of 8.8 and 6.3 out of 10.

However, GTSC reports that cybercriminals chained the two vulnerabilities to create backdoors on the victim’s system and also move laterally through the compromised network. “After successfully mastering the exploit, we recorded attacks to collect information and create a foothold in the victim’s system,” said GTSC.

GTSC said it suspects a Chinese threat group may be responsible for the ongoing attacks because the webshell codepage uses character encoding for simplified Chinese. The attackers have also deployed the China Chopper webshell in attacks for persistent remote access, which is a backdoor commonly used by China state sponsored hacking groups.

Security researcher Kevin Beaumont, who was among the first to discuss GTSC’s findings in a series of tweets on Thursday, said he is aware of the vulnerability being “actively exploited in the wild” and that he “can confirm significant numbers of Exchange servers have been backdoored.”

Microsoft declined to say when patches would become available, but noted in its blog post that the upcoming fix is on an “accelerated timeline.”

Until then, the company is recommending that customers follow the temporary mitigation measures shared by GTSC, which involves adding a blocking rule in IIS Manager. The company noted that Exchange Online Customers do not need to take any action at the moment because the zero-days only impact on-premise Exchange servers.



[ad_2]

You Might Also Like

Revyze is building the TikTok of educational videos

YouTube ends the test asking users to get a premium subscription to watch 4K videos

Who is going to buy Cadillac’s $300,000 hand-built EV?

Don’t let today’s software rally improve your mood

Daily Crunch: Kanye West reaches agreement to acquire social media platform Parler

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
admin September 30, 2022
Share this Article
Facebook TwitterEmail Print
Share
Previous Article Everstores, an Open Store-style D2C Shopify aggregator out of Europe, emerges from stealth with €18 million
Next Article Arrival produces long-awaited battery-electric commercial van

Latest News

earn bitcoins fast
How to earn bitcoins fast
crypto
Cryptocurrency is a Scam or Not
How to Tell If a Cryptocurrency is a Scam or Not
crypto
Losing In Cryptocurrency Trading
Tips to Avoid Losing In Cryptocurrency Trading
crypto
Sell Products Online with Bitcoins
How to Sell Products Online with Bitcoins – The Ultimate Guide
crypto

You Might also Like

Revyze is building the TikTok of educational videos

6 Min Read

YouTube ends the test asking users to get a premium subscription to watch 4K videos

2 Min Read

Who is going to buy Cadillac’s $300,000 hand-built EV?

4 Min Read

Don’t let today’s software rally improve your mood

1 Min Read

Crypto Community

  • Home
  • Crypto Calculator
  • Blog
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms and Conditions

Real time Cryptocurrency

  • Crypto Prices
  • Dogecoin price
  • Shibainu coin price
  • Bitcoin Price
  • Cardano Price
  • Litecoins Price

Cryptocurrency Price USD

  • Bitcoin price USD
  • Ethereum price USD
  • Tether price USD
  • BNB Price USD
  • Cardano Price USD
  • Solana Price USD
  • Peps coin Price USD
  • floki inu Price USD
  • SIA coin Price USD
CryptoCommunityCryptoCommunity
Follow US

© 2022 Cryptos Community All Rights Reserved. All logos and images used on this website are registered trademarks of their respective companies. All Rights Reserved. Cryptos Community is not liable for inaccuracies, errors, or omissions found herein. For the removal of copyrighted images, trademarks, or other issues, Contact Us. 


Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?