{"id":26807,"date":"2022-10-04T11:03:22","date_gmt":"2022-10-04T09:03:22","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=26807"},"modified":"2022-10-04T11:03:22","modified_gmt":"2022-10-04T09:03:22","slug":"exchange-server-microsofts-0-day-schutz-aushebelbar-neue-einschtzungen-3-oktober-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/10\/04\/exchange-server-microsofts-0-day-schutz-aushebelbar-neue-einschtzungen-3-oktober-2022\/","title":{"rendered":"Microsoft's 0-day protection bypassed, new assessments (Oct. 3, 2022)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Exchange Logo\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" border=\"0\" alt=\"Exchange Logo\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2022\/06\/Exchange.jpg\" width=\"171\" align=\"left\" height=\"150\">[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/10\/04\/exchange-server-microsofts-0-day-schutz-aushebelbar-neue-einschtzungen-3-oktober-2022\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A 0-day vulnerability (ZDI-CAN-18333) in Microsoft's on-premises Exchange Servers (2013, 2016, and 2019) has been known since late September 2022. The vulnerabilities (CVE-2022-41040, CVE-2022-41082) are already being exploited in the wild. Microsoft did respond and published a workaround as well as rolled out URI rewrite rules via EMS for protection. But the URI rewrite expressions can be bypassed. In addition, the first (so far fake) exploits are being offered on the Internet. Here is an overview of the latest developments.<!--more--><\/p>\n<h2>The 0-day vulnerability ZDI-CAN-18333<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/a224b87134d243789849814fdc14fe66\" width=\"1\" height=\"1\">As of Sept. 29, 2022, I had reported on the 0-day vulnerability ZDI-CAN-18333 in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/09\/30\/exchange-server-werden-ber-0-day-exploit-angegriffen-29-sept-2022\/\">Exchange Server servers attacked via 0-day exploit (Sept. 29, 2022)<\/a>. Microsoft Exchange Server 2013, 2016 and 2019 are at risk from two unpatched zero-day vulnerabilities CVE-2022-41040 (Server-Side Request Forgery) and CVE-2022-41082 (Remote Code Execution via PowerShell).<\/p>\n<blockquote>\n<p>The term <em>ProxyNotShell<\/em> is now used for the vulnerability because the vulnerabilities require a similar attack scenario to ProxyShell, but it is not the ProxyShell vulnerability. <\/p>\n<\/blockquote>\n<p>Fortunately, an attacker needs authenticated access to the vulnerable Exchange Server to successfully exploit either vulnerability. In addition, he must be able to execute PowerShell scripts (remotely), but then has the option of elevating privileges. On-premises installations that are not accessible via the Internet should be protected against remote attacks. However, many Exchange installations are directly accessible via the Internet (see <a href=\"https:\/\/borncity.com\/win\/2022\/09\/30\/microsofts-empfehlungen-fr-die-exchange-server-0-day-schwachstelle-zdi-can-18333\/\">Microsoft's recommendations for Exchange Server 0-day vulnerability ZDI-CAN-18333<\/a>).<\/p>\n<p><a href=\"https:\/\/twitter.com\/SophosXOps\/status\/1577060279619231744\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Sophos on Exchange 0-day\" alt=\"Sophos on Exchange 0-day\" src=\"https:\/\/i.imgur.com\/ThauX0y.png\"><\/a><\/p>\n<p>My gut feeling, however, is that the people behind the exploit (presumably based in China) have enough credentials from phishing attacks to attack numerous Exchange servers. The night I came across the above tweet from Sophos supporting this assessment. Sophos picked up on it <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/10\/03\/two-exchange-server-vulns-veer-dangerously-close-to-proxyshell\/\" target=\"_blank\" rel=\"noopener\">here<\/a> (see also above tweets)and writes that customers are protected with Sophos security solutions. <\/p>\n<blockquote>\n<p>In the meantime, the first (but so far probably fake) exploits for the above vulnerabilities are being offered for sale on the Internet by fraudsters. The colleagues from Bleeping Computer have pointed out the situation in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-microsoft-exchange-proxynotshell-exploits-for-sale-on-github\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>.<\/p>\n<\/blockquote>\n<h2>Microsoft's workaround can be bypassed<\/h2>\n<p>Last night I came across the following <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1576852912877101057\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from Kevin Beaumont on Twitter. A security researcher with the alias <em>Jangggg<\/em> looked at the URL pattern described by Microsoft in the blog post <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\">Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server<\/a>. His conclusion: the URI blocking rule is not sufficient, and can be easily bypassed. Beaumont verified it and confirms this.&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1576852912877101057\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Exchange 0-day: MS mitigation doesn't work\" alt=\"Exchange 0-day: MS mitigation doesn't work\" src=\"https:\/\/i.imgur.com\/KQPZKk9.png\"><\/a><\/p>\n<p>Microsoft has added the following guidance to the articles <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\">Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server<\/a> as of October 2, 2022:<\/p>\n<ul>\n<li><em>Added to the Mitigations section: we strongly recommend Exchange Server customers to disable remote PowerShell access for non-admin users in your organization. Guidance on how to do this for single user or multiple users is <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/exchange\/control-remote-powershell-access-to-exchange-servers?view=exchange-ps%22%20\\l%20%22use-the-exchange-management-shell-to-enable-or-disable-remote-powershell-access-for-a-user\" target=\"_blank\" rel=\"noopener\">here<\/a>.&nbsp; <\/em>\n<li><em>Updated Detection section to refer<\/em> to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/09\/30\/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082\/\" target=\"_blank\" rel=\"noopener\">Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082<\/a>.<\/li>\n<\/ul>\n<p>Administrators should prevent remote PowerShell access from running in their Exchange environment. Then a vulnerability can no longer be exploited and the attack vector no longer works in the previously known way. Problem: However, this could allow administrators to lock themselves out unintentionally in certain scenarios (see <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1577197806720208896?t=iFQMeB3J5tk7U2bMFhjymQ&amp;s=19\" target=\"_blank\" rel=\"noopener\">this warning<\/a> from Beaumont). In the following <a href=\"https:\/\/www.youtube.com\/watch?v=JQtW9xd5-Hw&amp;feature=youtu.be\" target=\"_blank\" rel=\"noopener\">YouTube video<\/a>, security researcher Jang demonstrates his findings (just click the image and watch the video on YouTube).<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=JQtW9xd5-Hw&amp;feature=youtu.be\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Microsoft Exchange mitigations bypass CVE-2022-41040, CVE-2022-41082\" alt=\"Microsoft Exchange mitigations bypass CVE-2022-41040, CVE-2022-41082\" src=\"https:\/\/i.imgur.com\/2LogMMF.png\"><\/a>(Source: YouTube)<\/p>\n<p>The colleagues from Bleeping Computer have published some more details in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-exchange-server-zero-day-mitigation-can-be-bypassed\/\" target=\"_blank\" rel=\"noopener\">this post<\/a>. To summarize: Security researchers like Will Dormann as well as the Vietnamese discoverers had tested Jang's approach and found that the pattern <em>\".autodiscover.json.*@.*Powershell.\"<\/em> was not sufficient to prevent attacks. The @ character is too much of a restriction, they say. The security researcher suggested the URI pattern <em>\".*autodiscover\\.json.*Powershell.*<\/em>\". Looks like the issue will continue to keep Exchange administrators busy. Above all, customers with hybrid Exchange solutions should be aware that they may also be at risk. Colleagues at Bleeping Computer state that, according to Beaumont, hybrid Exchange installations from more than 1,200 companies are accessible via the Internet.&nbsp;&nbsp;&nbsp; <\/p>\n<p><strong>Article series:<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/09\/30\/exchange-server-werden-ber-0-day-exploit-angegriffen-29-sept-2022\/\">Exchange Servers are attacked via 0-day exploit (Sept. 29, 2022)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/09\/30\/microsofts-empfehlungen-fr-die-exchange-server-0-day-schwachstelle-zdi-can-18333\/\">Microsoft's recommendations for Exchange Server 0-day vulnerability ZDI-CAN-18333<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/10\/01\/neues-zur-exchange-server-0-day-schwachstelle-zdi-can-18333-korrekturen-scripte-und-ep-lsung\/\">Update on Exchange Server 0-day Vulnerability ZDI-CAN-18333: Fixes, Scripts and EMS Solution<\/a> <\/p>\n<p><strong>Similar articles<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/08\/10\/exchange-server-sicherheitsupdates-9-august-2022\/\">Exchange Server Security updates (August 9, 2022)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/06\/30\/microsoft-exchange-server-remote-code-execution-schwachstelle-cve-2022-23277-trotz-patch-ausnutzbar\/\">Microsoft Exchange Server: Remote Code Execution vulnerability CVE-2022-23277 exploitable despite patch?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/06\/17\/anatomie-eines-hive-ransomware-angriffs-auf-exchange-per-proxyshell\/\">Anatomy of a Hive Ransomware Attack on Exchange via ProxyShell<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/11\/23\/warnung-proxyshell-squirrelwaffle-und-ein-poc-eploit-patcht-endlich-eure-exchange-server\/\">ProxyShell, Squirrelwaffle and a new PoC Exploit, patch your Exchange Server!<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/26\/exchange-und-proxyshell-neues-von-microsoft-und-sicherheitsspezialisten\/\">Exchange and ProxyShell: News from Microsoft and security experts<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/25\/proxyshell-proxylogon-und-microsofts-exchange-doku-fr-ausnahmen-vom-virenschutz\/\">ProxyShell, ProxyLogon and Microsoft's contradictious Exchange doc for virus scan exceptions<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/22\/angriffswelle-fast-2-000-exchange-server-ber-proxyshell-gehackt\/\">Wave of attacks, almost 2,000 Exchange servers hacked via ProxyShell<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/13\/angriffe-auf-exchange-server-per-proxyshell-schwachstelle-rollen-an-13-8-2021\/\">Attacks on Exchange Server via ProxyShell vulnerability (8\/13\/2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/10\/exchange-server-neues-zu-den-proxyshell-schwachstellen\/\">Exchange Server: Update on ProxyShell vulnerabilities<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/03\/11\/probleme-mit-exchange-mrz-2022-updates\/\">Issues with Exchange March 2022 Updates<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/04\/16\/exchange-update-fehler-und-infos-13-april-2021\/\">Exchange Update errors and information (April 13, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/exchange-probleme-mit-ecp-nach-sicherheitsupdate-mrz-2021\/\">Exchange isues with ECP\/OWA search after installing security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/13\/exchange-2016-2019-outlook-probleme-durch-amsi-integration\/\">Exchange 2016\/2019: Outlook problems due to AMSI integration<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/exchange-server-september-2021-cu-kommt-zum-28-9-2021-mit-microsoft-exchange-emergency-mitigation-service\/\">Exchange Server September 2021 CU comes Sept. 28 with Microsoft Exchange Emergency Mitigation Service<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/29\/exchange-server-2016-2019-benutzerdefinierte-attribute-in-ecp-nach-cu-installation-juli-2021-nicht-mehr-aktualisierbar\/\">Exchange Server 2016-2019: Custom attributes in ECP no longer updatable after CU installation (July 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/09\/01\/exchange-server-2013-tipps-von-microsoft-zur-auerbetriebnahme-der-systeme\/\">Exchange Server 2013: Microsoft's tips on decommissioning the systems<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/09\/16\/update-fr-exchange-extended-protection-script-aber-weiterhin-fehler\/\">Update for Exchange Extended Protection script, but still error<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2022\/09\/30\/exchange-health-checker-script-erweiterungen-von-frank-zchling\/\">Tip: Exchange Health Checker \u2013 Script extensions by Frank Z\u00f6chling<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A 0-day vulnerability (ZDI-CAN-18333) in Microsoft's on-premises Exchange Servers (2013, 2016, and 2019) has been known since late September 2022. The vulnerabilities (CVE-2022-41040, CVE-2022-41082) are already being exploited in the wild. Microsoft did respond and published a workaround as well &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/10\/04\/exchange-server-microsofts-0-day-schutz-aushebelbar-neue-einschtzungen-3-oktober-2022\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[869,69],"class_list":["post-26807","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-exchange","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/26807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=26807"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/26807\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=26807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=26807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=26807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}