{"id":23961,"date":"2024-02-16T06:10:19","date_gmt":"2024-02-16T14:10:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/16\/news-17691\/"},"modified":"2024-02-16T06:10:19","modified_gmt":"2024-02-16T14:10:19","slug":"news-17691","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/02\/16\/news-17691\/","title":{"rendered":"Microsoft Exchange vulnerability actively exploited"},"content":{"rendered":"\n<p>As it turns out, there was another actively exploited vulnerability included in Microsoft\u2019s <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/update-now-microsoft-fixes-two-zero-days-on-february-patch-tuesday\">patch Tuesday<\/a> updates for February.<\/p>\n<p>When Microsoft said in its <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21410\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">update guide for CVE-2024-21410<\/a> that the vulnerability was likely to be exploited by attackers, they weren\u2019t kidding. Soon after they changed the status to \u201cExploitation Detected\u201d.<\/p>\n<p>Today, I was alerted to the fact after spotting a <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2024\/2024-214205-1032.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warning<\/a> by the German Federal Office for Information Security (BSI) about the same vulnerability, Something the BSI does not do lightly.<\/p>\n<p>The Exchange vulnerability is listed in the Common Vulnerabilities and Exposures (CVE) database as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21410\">CVE-2024-21410<\/a>, an elevation of privilege vulnerability with a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> of 9.8 out of 10.<\/p>\n<p>Microsoft&#8217;s description of the vulnerability is a bit more revealing:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;An attacker could target an NTLM client such as Outlook with an NTLM credentials-leaking type vulnerability. The leaked credentials can then be relayed against the Exchange server to gain privileges as the victim client and to perform operations on the Exchange server on the victim&#8217;s behalf.&#8221;<\/p>\n<\/blockquote>\n<p>In a Windows network, NTLM (New Technology LAN Manager) is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users. An attacker being able to impersonate a legitimate user could prove to be catastrophic.<\/p>\n<p>Microsoft Exchange Servers, and mail servers in general, are central communication nodes in every organization and as such they are attractive targets for cybercriminals. Being able to perform a <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=36036\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">pass-the-hash<\/a> attack would provide an attacker with a paved way into the heart of the network.<\/p>\n<p>As part of the update, Microsoft has enabled Extended Protection for Authentication (EPA) by default with the Exchange Server 2019 Cumulative Update 14 (CU14). Without the protection enabled, an attacker can target Exchange Server to relay leaked NTLM credentials from other targets (for example Outlook).<\/p>\n<p>If you are running Exchange Server 2019 CU13 or earlier and you have previously run the script that enables NTLM credentials Relay Protections then you are protected from this vulnerability. However, Microsoft strongly suggests installing the latest cumulative update.<\/p>\n<p>Last year, Microsoft introduced Extended Protection support as an optional feature for Exchange Server 2016 CU23.<\/p>\n<p>If you are unsure whether your organization has configured Extended Protection, you can use the latest version of the <a href=\"https:\/\/aka.ms\/exchangeHealthChecker\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Server Health Checker script<\/a>. The script will provide you with an overview of the Extended Protection status of your server.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/microsoft-exchange-vulnerability-actively-exploited\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> One of Microsoft&#8217;s Patch Tuesday fixes has flipped from &#8220;Likely to be Exploited&#8221; to \u201cExploitation Detected\u201d. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17775,22783,32],"class_list":["post-23961","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exchange-server","tag-exploits-and-vulnerabilities","tag-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23961"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23961\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}