2022年10月5日星期三

Microsoft Exchange Zero-day Remote Code Execution Vulnerabilities

Last Update Date: 5 Oct 2022 Release Date: 30 Sep 2022

RISK: High Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

Multiple vulnerabilities have been identified in Microsoft Exchange. A remote user can exploit some of these vulnerabilities to trigger remote code execution on the targeted system.

 

Notes: No patch is currently available.

 

[Updated on 2022-09-30] Microsoft stated that the two vulnerabilities were used for limited targeted attacks into users’ systems, the Risk Level has updated to High Risk.

 

[Updated on 2022-10-05] Microsoft updated the workaround for this issue.


Impact

  • Remote Code Execution

System / Technologies affected

  • Microsoft Exchange Server 2013
  • Microsoft Exchange Server 2016
  • Microsoft Exchange Server 2019

Solutions

Workaround:

Reduce the vulnerability of attacks by adding a rule to block requests with indicators of attack through the URL Rewrite Rule module on IIS server.

 

  1. In Autodiscover at FrontEnd, select tab URL Rewrite, and then Request Blocking.
  2. Add string “.*autodiscover\.json.*Powershell.*” to the URL Path.
  3. Condition input: Choose {REQUEST_URI}

Vulnerability Identifier


Source


Related Link

沒有留言:

發佈留言

思科產品多個漏洞

思科產品多個漏洞 發佈日期: 2025年05月09日 風險: 中度風險 類型: 保安軟件及應用設備 - 保安軟件及應用設備 於思科產品發現多個漏...