{"id":16793,"date":"2020-11-18T00:10:00","date_gmt":"2020-11-17T23:10:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16793"},"modified":"2022-01-12T08:19:31","modified_gmt":"2022-01-12T07:19:31","slug":"weiter-ungepatchte-exchange-server-in-deutschland-nov-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/11\/18\/weiter-ungepatchte-exchange-server-in-deutschland-nov-2020\/","title":{"rendered":"Still Exchange servers unpatched for CVE-2020-0688 (Nov. 2020)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=237756\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Just a brief note to administrators of Microsoft Exchange servers: Did you patch them against the CVE-2020-0688 remote execution vulnerability? German CERT-Bund has been warning for weeks that numerous German Exchange servers accessible via the Internet are still vulnerable. I guess other countries shows a similar picture. <\/p>\n<p><!--more--><\/p>\n<h2>Warning from CERT-Bund about CVE-2020-0688 <\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/30577ec7c1864f1e8441477838c26715\" width=\"1\" height=\"1\">CERT-Bund complains on Twitter every day about unpatched Exchange servers in Germany. Here are the <a href=\"https:\/\/twitter.com\/certbund\/status\/1328641056615886849\" target=\"_blank\" rel=\"noopener noreferrer\">tweets<\/a>. 6 weeks ago, German CERT-Bund started a campaign in which daily reports were sent to German network operators\/providers. They were informed about vulnerable Microsoft Exchange servers that were accessible via the Internet and had the critical vulnerability CVE-2020-0688.<\/p>\n<p><img decoding=\"async\" title=\"CERT-Bund-Warnung vor Exchange-Schwachstelle CVE-2020-0688  \" alt=\"CERT-Bund-Warnung vor Exchange-Schwachstelle CVE-2020-0688  \" src=\"https:\/\/i.imgur.com\/tt1VLez.png\"><br \/>German CERT-Bund warns about Exchange vulnerability CVE-2020-0688&nbsp; <\/p>\n<p>The tweet above says: Even six weeks later, over half of these Internet-accessible Exchange servers in Germany are still unpatched. Just to mentions: The majority of these vulnerable machines are running Exchange 2010 installations. This version was dropped from support in October 2020. In another tweet (lower graphic) CERT-Bund shows the distribution over individual providers. This suggests that some providers inform their customers, while other providers let the CERT-Bund messages trickle out. So check the Exchange server installations you are responsible for, whether they are patched or not. <\/p>\n<h2>Background on the vulnerability CVE-2020-0688 <\/h2>\n<p>I had already reported this problem in the 2018 blog post <a href=\"https:\/\/borncity.com\/win\/2018\/11\/20\/vulnerability-in-exchange-server-2010-2019\/\">Vulnerability in Exchange Server 2010-2019<\/a>. A vulnerability CVE-2020-0688 exists in Exchange from version 2010 to 2019. An exploit for this vulnerability has been known since January 2020 and updates to close the vulnerability have been available since February 11, 2020. <\/p>\n<p>The vulnerability CVE-2020-0688 is a Microsoft Exchange Validation Key Remote Code Execution vulnerability described in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2020-0688\" target=\"_blank\" rel=\"noopener noreferrer\">this Microsoft document<\/a> dated February 11, 2020. The vulnerability that could be exploited to remote code execution is in Microsoft Exchange Server if the server is unable to create unique (cryptographic) keys during installation. <\/p>\n<p>Knowledge of a validation key allows an authenticated user with a mailbox to pass arbitrary objects to be deserialized by the Web application running as SYSTEM. Simon Zuckerbraun from the Zero Day Initiative has published this blog post on February 25, 2020 with some explanations. Tenable also has <a href=\"https:\/\/de.tenable.com\/blog\/cve-2020-0688-microsoft-exchange-server-static-key-flaw-could-lead-to-remote-code-execution\" target=\"_blank\" rel=\"noopener noreferrer\">this post<\/a> on the topic. Here are the available updates classified as important: <\/p>\n<ul>\n<li>Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30: <a href=\"https:\/\/support.microsoft.com\/help\/4536989\" target=\"_blank\" rel=\"noopener noreferrer\">KB4536989<\/a>\n<li>Microsoft Exchange Server 2013 Cumulative Update 23: <a href=\"https:\/\/support.microsoft.com\/help\/4536988\" target=\"_blank\" rel=\"noopener noreferrer\">KB4536988<\/a>\n<li>Microsoft Exchange Server 2016 Cumulative Update 14: <a href=\"https:\/\/support.microsoft.com\/help\/4536987\" target=\"_blank\" rel=\"noopener noreferrer\">KB4536987<\/a>\n<li>Microsoft Exchange Server 2016 Cumulative Update 15: <a href=\"https:\/\/support.microsoft.com\/help\/4536987\" target=\"_blank\" rel=\"noopener noreferrer\">KB4536987<\/a>\n<li>Microsoft Exchange Server 2019 Cumulative Update 3: <a href=\"https:\/\/support.microsoft.com\/help\/4536987\" target=\"_blank\" rel=\"noopener noreferrer\">KB4536987<\/a>\n<li>Microsoft Exchange Server 2019 Cumulative Update 4: <a href=\"https:\/\/support.microsoft.com\/help\/4536987\" target=\"_blank\" rel=\"noopener noreferrer\">KB4536987<\/a><\/li>\n<\/ul>\n<p>So the required security updates are now available and can be installed. However, there were issues with the update, as I mentioned in the article <a href=\"https:\/\/borncity.com\/win\/2020\/03\/02\/exchange-server-2013-issue-with-security-update-kb4536988\/\">Exchange Server 2013: Issue with Security Update KB4536988<\/a>. In the article you can find hints how affected people can get the Exchange Server up and running again.&nbsp; <\/p>\n<p><strong>Similar articles:<br \/><a href=\"https:\/\/borncity.com\/win\/2018\/11\/20\/vulnerability-in-exchange-server-2010-2019\/\">Vulnerability in Exchange Server 2010-2019<\/a>.<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/02\/26\/security-information-feb-25-2020\/\">Security information (Feb. 25, 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/30\/exchange-server-terrible-patch-status-v2010-reaches-eol\/\">Exchange Server: Terrible Patch Status; v2010 reaches EOL<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/02\/28\/attack-to-unpatched-exchange-servers-cve-2020-0688\/\">Attack to unpatched Exchange Servers (CVE-2020-0688)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/04\/08\/exchange-server-80-not-patched-against-cve-2020-0688\/\">Exchange Server: 80% not patched against CVE-2020-0688<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/02\/exchange-server-2013-issue-with-security-update-kb4536988\/\">Exchange Server 2013: Issue with Security Update KB4536988<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Just a brief note to administrators of Microsoft Exchange servers: Did you patch them against the CVE-2020-0688 remote execution vulnerability? German CERT-Bund has been warning for weeks that numerous German Exchange servers accessible via the Internet are still vulnerable. I &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/11\/18\/weiter-ungepatchte-exchange-server-in-deutschland-nov-2020\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[869,69],"class_list":["post-16793","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-exchange","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16793"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16793\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}