Register now for better personalized quote!

Exchange Server bug: Patch now, but multi-factor authentication might not stop these attacks, warns Microsoft

Nov, 10, 2021 Hi-network.com

Microsoft has released security updates for its Exchange on-premises email server software that businesses should take on board.

Recommends

  • Best VPN services
  • Best security keys
  • Best antivirus software
  • The fastest VPNs

The security updates are for flaws in Exchange Server 2013, 2016, and 2019 -- the on-premises versions of Exchange that were compromised earlier this year by the Beijing-backed hacking group that Microsoft calls Hafnium. Four vulnerabilities in on-premises Exchange server software were exploited, and now Microsoft has warned that one newly-patched flaw -- tracked as CVE-2021-42321 -- is also under attack.

The Exchange security updates were released as part of Microsoft's November 2021 Patch Tuesday updates for Windows, the Edge browser, the Office suite, and other software products.

"The Exchange bug CVE-2021-42321 is a "post-authentication vulnerability in Exchange 2016 and 2019. Our recommendation is to install these updatesimmediatelyto protect your environment," Microsoft said in a blog post about the new Exchange bugs.

"These vulnerabilities affect on-premises Microsoft Exchange Server, including servers used by customers in Exchange Hybrid mode. Exchange Online customers are already protected and do not need to take any action," Microsoft notes. 

Attacks that affect users after authentication are risky because they affect users who have authenticated with legitimate but stolen credentials. Some post-authentication attacks can render two-factor authentication useless since the malware does its trick after a person has authenticated with a second factor.

The China-based attackers accessed Exchange Servers through the four bugs or stolen credentials, allowing them to create web shells -- a command-line interface -- to remotely communicate with an infected computer. Web shells are handy for attackers because they can survive on a system after a patch and need to be manually removed.

Attackers generally go after admin credentials to run malware, but they also use connections that aren't protected by a VPN. Alternatively, they attack VPNs themselves.

Microsoft provides detailed update instructions that Exchange admins should follow, including updating the relevant cumulative updates (CU) for Exchange Server 2013, 2016, and 2019.

The company cautions that admins should update to one of the supported CUs: it won't be providing updates to unsupported CUs, which won't be able to install the November security updates. 

Microsoft confirmed that two-factor authentication (2fa) won't necessarily protect against attackers exploiting the new Exchange flaws, particularly if an account has already been compromised.

"If auth is successful (2FA or not) then CVE-2021-42321 could be exploitable," says Microsoft program manager Nino Bilic. 

"But indeed, 2FA can make authentication be harder to go through so in that respect, it can 'help'. But let's say if there is an account with 2FA that has been compromised -- well, in that case it would make no difference," Bilic adds.

To detect compromises, Microsoft recommends running the PowerShell query on your Exchange server to check for specific events in the Event Log:

Get-EventLog -LogName Application -Source "MSExchange Common" -EntryType Error Where-Object {$_.Message -like "*BinaryFormatter.Deserialize*" }

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next


tag-icon Hot Tags : Tech Security

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.