ĢTV

This is some text inside of a div block.
Glitch effect

New 0-Day Vulnerabilities Found in Microsoft Exchange

Contributors:
Special thanks to our Contributors:
Glitch effectGlitch effectGlitch effect
Glitch banner

Our team is currently investigating new 0-day vulnerabilities in Microsoft Exchange servers that could lead to Remote Code Execution (RCE) for an authenticated user.

ThreatOps team Slack screenshot

Our ThreatOps team discovered , and the team began to research and see if anyone else in the community had flagged it. We found from Security Researcher Kevin Beaumont, where he notes that “significant numbers of Exchange servers have been backdoored - including a honeypot.”

We’ll continue to update this blog with our latest findings and research.

Updates

Update 1 (9/29/22 @ 8:18pm ET): Clarified GTSC updated language to affirm this is a new vulnerability and 0-day.
Update 2 (9/30/22 @ 9:23am ET): Included Microsoft official details and CVE identifiers.

What You Need to Know

As of 9/29/22 @ 8:18pm ET, the GTSC has been updated to reaffirm that this is a new 0-day vulnerability and Remote Code Execution exploit. Unfortunately, this means that the latest patch and Cumulative Updates are not sufficient to protect Exchange servers from this threat. Currently, there are no known proof-of-concept scripts or exploitation tooling available in the wild.

GTSC vulnerability screenshot

The best thing you can do right now is to in GTSC's post.

As another resource to monitor, the is tracking two issues related to the observed exploitation so far, tagged as ZDI-CAN-18333 and ZDI-CAN-18802.

As of 9/30/22 @ 9:23am ET, we see that about this issue. They have announced there are two new vulnerabilities:

  1. CVE-2022-41040 - Server-side request forgery, allowing authenticated attackers to make requests posing as the affected machine
  2. շ-2022-41082- Remote Code Execution, allowing authenticated attackers to execute arbitrary PowerShell.

The first vulnerability can be used to achieve the second, but it must be clear that this is only an attack vector for an authenticated adversary. Currently, no official patch has been released by Microsoft yet.

, as a significant number may be running a hybrid server that migrated to Exchange Online and are still vulnerable to this post-authentication threat. Shodan reports over 1,200 potentially vulnerable endpoints with this attack surface.

Shodan reports over 1,200 potentially vulnerable endpoints

The freely available Microsoft Defender antivirus will detect the current publicly known post-exploitation attempts as and .

What ĢTV Partners Need to Know

We’ve got ~4,500 Exchange servers with our agent on them, and we’re actively looking into any red flags and potential signs of exploitation in these servers. 

The ĢTV Managed Antivirus service will notify our ThreatOps team of any of the above Microsoft Defender detections and enable our team to begin to triage and investigate. At the moment, ĢTV has not seen any signs of exploitation or indicators of compromise on our partners' devices.

Confirmed Webshell Paths

(Credit to this published by the GTSC Team)

  • [.highlight]C:\Program Files\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\owa\auth\RedirSuiteServiceProxy.aspx[.highlight]
  • [.highlight]C:\inetpub\wwwroot\aspnet_client\Xml.ashx[.highlight]
  • [.highlight]C:\Program Files\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\owa\auth\pxh4HG1v.ashx[.highlight]
Share

Sign Up for Blog Updates

Subscribe today and you’ll be the first to know when new content hits the blog.

By submitting this form, you accept our Privacy Policy
Oops! Something went wrong while submitting the form.
ĢTV at work
Response to Incidents
Response to Incidents