Two zero-day vulnerabilities were discovered in Microsoft Exchange Server 2013, 2016, and 2019. One vulnerability, CVE-2022-41040 is a Server-Side Request Forgery (SSRF) vulnerability; the other, CVE-2022-41082, is a remote-code execution (RCE) vulnerability when the attacker can access PowerShell.
🚨 There’s reports emerging that a new zero day exists in Microsoft Exchange, and is being actively exploited in the wild 🚨
I can confirm significant numbers of Exchange servers have been backdoored – including a honeypot.
Thread to track issue follows:
— Kevin Beaumont (@GossiTheDog) September 29, 2022
These vulnerabilities are nearly indistinguishable to many ProxyShell attacks in their log and behavior pattern once Exchange is exploited.
ProxyShell is a series of critical vulnerabilities discovered in 2021 that affect on-premises Microsoft Exchange servers. ProxyShell vulnerabilities are especially critical not only because they allow RCE, but because they are relatively easy to execute. The report of an RCE vulnerability within PowerShell Remote is additionally concerning; however, exposure should be limited to internal authenticated users as long as there are no exposed 5985 or 5986 ports to the internet.
It appears these new Exchange vulnerabilities were created by a specific new group that built new attack methods. However, the attack is no different from ProxyShell in the end as we’ve seen: a threat actor spawns cmd via ProxyShell (e.g., spawned via w3wp.exe) and then uses an environment’s living off the land binaries to execute the attack.
At the time of this writing, neither CVE rating can be found in NIST’s National Vulnerability Database or MITRE.
However, an RCE is one of the most dangerous types of flaws because it allows an adversary to execute malicious code on vulnerable servers. While Microsoft has confirmed that these are two new RCE vulnerabilities, they have further clarified that authenticated access to the vulnerable Exchange server is required to exploit either of them.
According to Microsoft, Exchange Online customers do not need to take any action. However, customers running Microsoft Exchange on-premises should apply Microsoft’s URL Rewrite Instructions and block any exposed Remote PowerShell ports.
The following mitigation details were provided by Microsoft and derived with support by the original reporter of this vulnerability.
The current mitigation is to add a blocking rule in “IIS Manager > Default Web Site > Autodiscover > URL Rewrite > Actions” to block the known attack patterns.
Microsoft has confirmed that the following URL Rewrite Instructions, which are currently being discussed publicly, are successful in breaking current attack chains.
.*autodiscover\.json.*\@.*Powershell.*
” (excluding quotes) and click OK..*autodiscover\.json.*\@.*Powershell.*
” and click Edit under Conditions. Impact: There is no known impact to Exchange functionality if the URL Rewrite module is installed as recommended.
Authenticated attackers who can access PowerShell Remoting on vulnerable Exchange systems will be able to trigger RCE using CVE-2022-41082. Blocking the ports used for Remote PowerShell can limit these attacks.
Microsoft has prioritized getting a fix released for these vulnerabilities, so be prepared to start patching once that becomes available.
Update: 10/3/2022 @ 1:30 PM ET
.*autodiscover\.json.*Powershell.*
Email=autodiscover
Organizations should collect logs with Sysmon on Exchange hosts to identify any malicious activity.
Blumira customers can detect this attack at a number of positions within the kill-chain, keeping in mind that Exchange runs on top of the IIS process itself.
For further technical details, see:
Blumira’s cloud SIEM detects and alerts you about suspicious behavior in your environment so that you can stop an incident early enough to prevent damage. Each finding we send is accompanied with a security playbook, giving you clear recommendations on how to remediate an attack. Our support team of security analysts is always available to answer questions on how to interpret a finding, or for other security help.
Blumira’s free SIEM is easy to deploy; IT and security teams can start seeing immediate security value for their organizations.