2022年10月1日星期六

Microsoft Exchange Zero-day Remote Code Execution Vulnerabilities

Last Update Date: 30 Sep 2022 17:00 Release Date: 30 Sep 2022

RISK: High Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

Multiple vulnerabilities have been identified in Microsoft Exchange. A remote user can exploit some of these vulnerabilities to trigger remote code execution on the targeted system.

 

Notes: No patch is currently available.

 

[Updated on 2022-09-30] Microsoft stated that the two vulnerabilities were used for limited targeted attacks into users’ systems, the Risk Level has updated to High Risk.


Impact

  • Remote Code Execution

System / Technologies affected

  • Microsoft Exchange Server 2013
  • Microsoft Exchange Server 2016
  • Microsoft Exchange Server 2019

Solutions

Workaround:

Reduce the vulnerability of attacks by adding a rule to block requests with indicators of attack through the URL Rewrite Rule module on IIS server.

 

  1. In Autodiscover at FrontEnd, select tab URL Rewrite, and then Request Blocking.
  2. Add string “.*autodiscover\.json.*\@.*Powershell.*“ to the URL Path.
  3. Condition input: Choose {REQUEST_URI}

Vulnerability Identifier


Source


Related Link

沒有留言:

發佈留言

Android 多個漏洞

Android 多個漏洞 發佈日期: 2025年05月07日 風險: 高度風險 類型: 操作系統 - 流動裝置及操作系統 於 Android 發...