{"id":20949,"date":"2021-08-10T14:52:42","date_gmt":"2021-08-10T12:52:42","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20949"},"modified":"2021-08-10T14:52:42","modified_gmt":"2021-08-10T12:52:42","slug":"exchange-server-neues-zu-den-proxyshell-schwachstellen","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/08\/10\/exchange-server-neues-zu-den-proxyshell-schwachstellen\/","title":{"rendered":"Exchange Server: Update on ProxyShell vulnerabilities"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/10\/exchange-server-neues-zu-den-proxyshell-schwachstellen\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Unknown thread actors are scanning the Internet for Microsoft Exchange servers that are updated to March 2021 and are not protected against the ProxyLogon vulnerability. CERT-Bund warns, and calls for patching. Meanwhile, there are advanced Sigma rules for administrators to defend against attacks. And there is a script that administrators can use to check whether their own Exchange servers are vulnerable. Below I have summarized some information around this topic. <\/p>\n<p><!--more--><\/p>\n<h2>Old vulnerabilities, new attack scenarios<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/6dcda76e52c1455eb328de9c844072a4\" width=\"1\" height=\"1\">Taiwanese security researcher Orange Tsai from the DEVCORE team gave a presentation on Exchange vulnerabilities at BlackHat 2021 last week. In it, he showed how by combining old vulnerabilities (e.g., CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) that were closed by updates in April 2021, Microsoft Exchange servers can be attacked and taken over via exploits called ProxyLogon, ProxyOracle, and ProxyShell. Since that presentation at BlackHat 2021, security researchers have noted that their Exchange servers acting as honeypots are being actively scanned by attackers for unclosed vulnerabilities. <\/p>\n<p>I had already blogged a few days ago about that in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/08\/08\/exchange-schwachstellen-droht-hafnium-ii\/\">Exchange vulnerabilities: Will we see Hafnium II?<\/a>. The recommendation was to update the on-premises Exchange servers to the latest patch level and to make sure that they are not accessible via the Internet. In the blog post, I also pointed out that there are thousands of Exchange servers in USA and Europe, that are not patched.&nbsp; <\/p>\n<h2>Warning from CERTs<\/h2>\n<p>In the meantime, several CERTs has taken up the issue and warns in the following <a href=\"https:\/\/twitter.com\/CERTNZ\/status\/1424229213532352517\" target=\"_blank\" rel=\"noopener\">tweet<\/a> about the security vulnerabilities mentioned above.<\/p>\n<p><a href=\"https:\/\/twitter.com\/CERTNZ\/status\/1424229213532352517\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"ProxyShell Warning from CERT\" alt=\"ProxyShell Warning from CERT\" src=\"https:\/\/i.imgur.com\/sHQjoNJ.png\"><\/a><\/p>\n<p>Jan Kopriva from SANS Institute has tried to find out how many servers might be affected by ProxyShell attack and vulnerabilities CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207 via the search engine Shodan and are accessible via the Internet. The results from the following <a href=\"https:\/\/twitter.com\/jk0pr\/status\/1424683472006918145\" target=\"_blank\" rel=\"noopener\">tweet<\/a>, or from <a href=\"https:\/\/isc.sans.edu\/diary\/27732\" target=\"_blank\" rel=\"noopener\">this article<\/a>, are devastating.<\/p>\n<p>&nbsp;<a href=\"https:\/\/twitter.com\/jk0pr\/status\/1424683472006918145\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Angreifbare Exchange-Server\" alt=\"Angreifbare Exchange-Server\" src=\"https:\/\/i.imgur.com\/Uqigeph.png\"><\/a><\/p>\n<p>In USA are more than 8.000 vulnerable Exchange Server reachable via Internet erreichen and has vulnerability CVE-2021-34473 unpatched. <strong><\/strong><\/p>\n<h2>ProxyShell checker as Nmap plugin <\/h2>\n<p>Security researcher Kevin Beaumont, who also runs the attacked Exchange honeypot, has written a ProxyShell Checker on the fly and made it available on <a href=\"https:\/\/github.com\/GossiTheDog\/scanning\/blob\/main\/http-vuln-exchange-proxyshell.nse\" target=\"_blank\" rel=\"noopener\">his GitHub page<\/a>. <\/p>\n<p><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1424700702325104646\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"ProxyShell Checker as Nmap-Plugin \" alt=\"ProxyShell Checker as Nmap-Plugin \" src=\"https:\/\/i.imgur.com\/rOdY9Pb.png\"><\/a><\/p>\n<p>The scanner is implemented as an Nmap plugin. <a href=\"https:\/\/nmap.org\/\" target=\"_blank\" rel=\"noopener\">Nmap<\/a> (\"Network Mapper\") is a free and open source (licensed) network detection and security scanning utility.&nbsp; <\/p>\n<h2>Sigma rules for ProxyShell attacks<\/h2>\n<p>Florian Roth points out in the following <a href=\"https:\/\/twitter.com\/cyb3rops\/status\/1424764132197388288\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that he has extended and modified the <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/pull\/1817\/files\" target=\"_blank\" rel=\"noopener\">ProxyShell Sigma rules<\/a> (see <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\" target=\"_blank\" rel=\"noopener\">also<\/a>) for SIEM systems with the help of @buffaloverflow. The rules now distinguish between attempted and successful exploitation.<\/p>\n<p><a href=\"https:\/\/twitter.com\/cyb3rops\/status\/1424764132197388288\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Sigma-Rules for ProxyShell\" alt=\"Sigma-Rules for ProxyShell\" src=\"https:\/\/i.imgur.com\/7b8FjuP.png\"><\/a>&nbsp;<\/p>\n<p><strong>Similar articles<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/03\/exchange-server-0-day-exploits-werden-aktiv-ausgenutzt-patchen\/\">Exchange server 0-day exploits are actively exploited<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/wichtige-hinweise-microsofts-und-des-bsi-zum-exchange-server-sicherheitsupdate-mrz-2021\/\">Important notes from Microsoft regarding the Exchange server security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/exchange-probleme-mit-ecp-nach-sicherheitsupdate-mrz-2021\/\">Exchange isues with ECP\/OWA search after installing security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/07\/neues-zum-exchange-hack-testtools-von-microsoft-co\/\">Exchange Hack News \u2013 Test tools from Microsoft and others<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/08\/microsoft-msert-hilft-bei-exchange-server-scans\/\">Microsoft MSERT helps to scan Exchange Servers<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/08\/cyber-angriff-auf-exchange-server-der-europische-bankenaufsichtsbehrde\/\">Cyber attack on Exchange server of the European Banking Authority<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/09\/exchange-hack-neue-patches-und-neue-erkenntnisse\/\">Exchange hack: new patches and new findings<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/16\/exchange-server-remote-code-execution-schwachstelle-cve-2020-16875\/\">Exchange Server: Remote Code Execution Vulnerability CVE-2020-16875<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/11\/exchange-hack-neue-opfer-neue-patches-neue-angriffe\/\">Exchange hack: new victims, new patches, new attacks<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/13\/neues-zur-proxylogon-hafnium-exchange-problematik-12-3-2021\/\">Update on ProxyLogon hafnium exchange issue (March 12, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/14\/gab-es-beim-exchange-massenhack-ein-leck-bei-microsoft\/\">Was there a leak at Microsoft in the Exchange mass hack?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/15\/proxylogon-hack-repository-fr-betroffene-exchange-administratoren\/\">ProxyLogon hack: Administrator's Repository for affected Exchange systems<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/16\/microsoft-exchange-on-premises-one-click-mitigation-tool-eomt-freigegeben\/\">Microsoft Exchange (On-Premises) one-click Mitigation Tool (EOMT) released<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/17\/exchange-server-2013-sicherheitsupdate-fr-service-pack-1\/\">Security update for Exchange Server 2013 SP1; CUs for Exchange 2019 and 2016 (03\/16\/2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/18\/exchange-proxylogon-news-patchstand-neuer-poc-und-neue-erkenntnisse-18-3-2021\/\">Exchange ProxyLogon News: Patch status, new PoC and new findings (03\/18\/2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/19\/microsoft-defender-schliet-automatisch-cve-2021-26855-auf-exchange-server\/\">Microsoft Defender automatically mitigates CVE-2021-26855 on Exchange Server<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/04\/01\/exchange-hack-wie-schaut-es-mit-dem-risiko-aus-was-gibt-es-neues-1-april-2021\/\">Exchange hack news: What's about risk? (April 1, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/04\/11\/vorwarnung-0-day-schwachstellen-ist-das-nchste-exchange-drama-im-anrollen\/\">PSA: Watch your Exchange Patch status \u2013 0 day vulnerabilities found, is the next Exchange disaster in sight?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/08\/exchange-schwachstellen-droht-hafnium-ii\/\">Exchange vulnerabilities: Will we see Hafnium II?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Unknown thread actors are scanning the Internet for Microsoft Exchange servers that are updated to March 2021 and are not protected against the ProxyLogon vulnerability. CERT-Bund warns, and calls for patching. Meanwhile, there are advanced Sigma rules for administrators to &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/08\/10\/exchange-server-neues-zu-den-proxyshell-schwachstellen\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[869,69,195],"class_list":["post-20949","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-exchange","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20949"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20949\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}