No permanent fix for the Exchange Server vulnerabilities is yet available, but other steps can mitigate the risk. Credit: Microsoft / TBIT Attackers are currently exploiting two unpatched vulnerabilities to remotely compromise on-premises Microsoft Exchange servers. Microsoft confirmed the flaws late last week and published mitigation advice until a complete patch can be developed, but according to reports, the proposed mitigation can be easily bypassed.The new vulnerabilities were discovered in early August by a Vietnamese security company called GTSC while performing security monitoring and incident response for a customer whose servers were attacked. Initially, the GTSC researchers thought they might be dealing with a ProxyShell exploit based on the malicious requests seen in the server logs which looked similar. ProxyShell is an attack that chains three Exchange vulnerabilities and was patched last year.However, the incident response team quickly realized that the compromised Exchange servers where attackers had obtained remote code execution capabilities were fully up to date, which meant this couldn’t be ProxyShell. After reverse engineering confirmed they were dealing with previously unknown vulnerabilities, they submitted a report to Trend Micro’s Zero Day Initiative (ZDI) program whose analysts confirmed them and shared them with Microsoft.The new attack exploits two vulnerabilitiesThe new attack chain exploits two new flaws that Microsoft now tracks as CVE-2022-41040 and CVE-2022-41082. The first one is a server-side request forgery (SSRF) issue that enables an authenticated attacker to trigger the second vulnerability. This in turn allows remote code execution via PowerShell. The flaws affect Microsoft Exchange Server 2013, Exchange Server 2016 and Exchange Server 2019, while Microsoft Exchange Online already has detections and mitigations in place. “It should be noted that authenticated access to the vulnerable Exchange Server is necessary to successfully exploit either vulnerability,” Microsoft said in its advisory. In the attacks seen by GTSC across multiple customers, the attackers used the exploit to deploy web shells – backdoor scripts – masquerading as legitimate Exchange files such as RedirSuiteServiceProxy.aspx. They then proceeded to deploy credential dumping malware to steal credentials from the compromised servers. Based on the choice of web shells and other artifacts left behind, the researchers suspect the attackers are Chinese.According to a separate report by Cisco Talos, the attackers used Antsword, a popular Chinese language-based open-source web shell; SharPyShell, an ASP.NET-based web shell; and China Chopper. They also abuse certutil, a legitimate utility, to download and deploy implants. Microsoft’s mitigation for the Exchange Server zero-days can be bypassedMicrosoft’s proposed mitigation is to block the known attack patterns by using the URL Rewrite engine available under “IIS Manager -> Default Web Site -> URL Rewrite -> Actions”. The company provided a blocking rule and wrote a PowerShell script to automate the deployment.However, a Vietnamese security researcher with the Twitter handle Janggggg pointed out on Monday that the blocking rule can easily be bypassed. This was confirmed by other security researchers, including former CERT/CC analyst Will Dormann, who wrote:“The ‘@’ in the Microsoft-recommended “.*autodiscover.json.*@.*Powershell.*” URL block mitigations for CVE-2022-41040 CVE-2022-41082 seems unnecessarily precise, and therefore insufficient. Probably try “.*autodiscover.json.*Powershell.*” instead.”In addition to this blocking rule, Microsoft also strongly recommends organizations disable remote PowerShell access for non-admin users because without attackers having the ability to reach PowerShell from a compromised account this attack would be ineffective. That still leaves admin users vulnerable, but if an admin user is compromised the attackers already have a lot of power.Microsoft provides instructions on how to disable remote PowerShell access for users in a separate article as well as detection and threat hunting guidance for the currently observed attacks. The GTSC and Talos reports also contain indicators of compromise. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe