{"id":33250,"date":"2024-02-16T00:01:17","date_gmt":"2024-02-15T23:01:17","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33250"},"modified":"2024-02-15T22:27:01","modified_gmt":"2024-02-15T21:27:01","slug":"follow-up-on-cu-14-for-exchange-2019-and-vulnerability-cve-2024-21410-feb-2024","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/02\/16\/follow-up-on-cu-14-for-exchange-2019-and-vulnerability-cve-2024-21410-feb-2024\/","title":{"rendered":"Follow-up on CU 14 for Exchange 2019 and vulnerability CVE-2024-21410 (Feb. 2024)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Exchange Logo\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2022\/06\/Exchange.jpg\" alt=\"Exchange Logo\" width=\"143\" height=\"125\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/15\/nachlese-zu-cu-14-fr-exchange-2019-und-schwachstelle-cve-2024-21410-feb-2024\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]On February 13, 2024, a critical vulnerability CVE-2024-21410 in Microsoft Exchange Server became public. The Elevation of Privilege vulnerability has a CVEv3 score of 9.8 and is likely to be exploited (soon). Security authorities are warning about this vulnerability. However, there was confusion among the blog readership because as of February 13, there was only CU 14 for Exchange Server 2019, which does not explicitly close the vulnerability. What about Exchange Server 2016 and what do I need to do to be protected against CVE-2024-21410? Here is a review with a rough outline.<\/p>\n<p><!--more--><\/p>\n<h2>The vulnerability CVE-2024-21410<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/89df650bc5f44206bd43eda6548a4adf\" alt=\"\" width=\"1\" height=\"1\" \/>I pointed out the Microsoft Exchange Server Elevation of Privilege vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21410\" target=\"_blank\" rel=\"noopener\">CVE-2024-21410<\/a> in the blog post <a href=\"https:\/\/borncity.com\/win\/2024\/02\/13\/microsoft-security-update-summary-february-13-2024\/\" target=\"_blank\" rel=\"noopener\">Microsoft Security Update Summary (February 13, 2024)<\/a> from February 13, 2024. The vulnerability is classified as critical with a CVEv3.1 score of 9.8. Microsoft has since stated that attacks are taking place. Successful exploitation of this vulnerability allows an attacker to forward a New Technology LAN Manager Version 2 (NTLMv2) hash against a vulnerable server. NTLM hashes could be abused in NTLM relay or pass-the-hash attacks to strengthen an attacker's position in an organization.<\/p>\n<p>German CERT BSI <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2024\/2024-214205-1032\" target=\"_blank\" rel=\"noopener\">warns<\/a>has now been issued against this critical vulnerability, after Microsoft added the note that the vulnerability is already being actively exploited. The vulnerability allows external attackers in connection with potential further vulnerabilities in NTLM clients (such as Outlook) to authenticate themselves to a vulnerable Exchange Server with stolen Net-NTLMv2 hash values and perform actions with the authorizations of the original victim.\u00a0inzwischen vor dieser kritischen Schwachstelle, nachdem Microsoft den Hinweis, dass die Sicherheitsl\u00fccke bereits aktiv ausgenutzt wird, erg\u00e4nzt hat. Die Schwachstelle erm\u00f6glicht es externen Angreifenden im Zusammenhang mit potenziellen weiteren Verwundbarkeiten in NTLM-Clients (wie Outlook), sich mit entwendeten Net-NTLMv2-Hashwerten bei einem verwundbaren Exchange Server zu authentifizieren und Aktionen mit den Berechtigungen des urspr\u00fcnglichen Opfers durchzuf\u00fchren.<\/p>\n<h2>Protecting the Exchange Server<\/h2>\n<p>When I wrote the posts on Feb. patchday, it was still unclear (to me) how to protect Exchange servers. As of February 13, 2024, there was only a cumulative update (CU 14) for Exchange Server 2019, which did not contain a patch against the vulnerability. It is now clear that the protection works differently and that Exchange Server 2016 can also be protected.<\/p>\n<ul>\n<li>These NTLM relay attacks mentioned above can be prevented by the Exchange Server protection function Extended Protection (EP), also known as Extended Protection for Authentication (EPA), which has been available since fall 2022.<\/li>\n<li>The CU14 update for Exchange Server 2019 activates Extended Protection (EP) by default, so the server in question is then protected. Without CU 14, Extended Protection must be explicitly activated on Exchange 2019.<\/li>\n<li>For Exchange Server 2016, the CU23 (from April 2022) and the security update from August 2022 must be installed, as support for Extended Protection was introduced there as an optional function. Extended Protection must then be activated<\/li>\n<\/ul>\n<p>Further details can be found in the support article for <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21410\" target=\"_blank\" rel=\"noopener\">CVE-2024-21410<\/a> and in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-2024-h1-cumulative-update-for-exchange-server\/ba-p\/4047506\" target=\"_blank\" rel=\"noopener\">this Exchange blog post<\/a>.<\/p>\n<h2>Possible problems<\/h2>\n<p>At this point the reference to <a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/13\/exchange-server-sicherheitsupdate-cu-14-13-februar-2024\/#comment-173236\" target=\"_blank\" rel=\"noopener\">this German comment<\/a> from Edmund, whose clients can no longer connect to Outlook via MAPI\/RPC over https. He is always prompted to enter user\/password, even with correct data no login possible. In a follow-up comment, the reader suggests certificate problems.<\/p>\n<p><strong>Similar articles:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/office-project-update-kb5002530-february-6-2024\/\">Office: Project Update KB5002530 (February 6, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/13\/microsoft-security-update-summary-february-13-2024\/\" target=\"_blank\" rel=\"noopener\">Microsoft Security Update Summary (February 13, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/14\/patchday-windows-10-updates-february-13-2024\/\">Patchday: Windows 10 Updates (February 13, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/14\/patchday-windows-11-server-2022-updates-february-13-2024\/\" target=\"_blank\" rel=\"noopener\">Patchday: Windows 11\/Server 2022 Updates (February 13, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/14\/windows-server-2012-r2-und-windows-7-server-2008-r2-february-13-2024\/\" target=\"_blank\" rel=\"noopener\">Windows 7\/Server 2008 R2; Server 2012 R2: Updates (February 13, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/15\/microsoft-office-updates-february-13-2024\/\">Microsoft Office Updates (February 13, 2024)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2024\/02\/14\/exchange-server-sicherheitsupdate-cu-14-february-13-2024\/\">Exchange Server Cumulative Update CU 14 (February 13, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/15\/warning-about-critical-outlook-rce-vulnerability-cve-2024-21413\/\" rel=\"bookmark\">Warning about critical Outlook RCE vulnerability CVE-2024-21413<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]On February 13, 2024, a critical vulnerability CVE-2024-21410 in Microsoft Exchange Server became public. The Elevation of Privilege vulnerability has a CVEv3 score of 9.8 and is likely to be exploited (soon). Security authorities are warning about this vulnerability. However, &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/02\/16\/follow-up-on-cu-14-for-exchange-2019-and-vulnerability-cve-2024-21410-feb-2024\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[869,69,195],"class_list":["post-33250","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-exchange","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33250"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33250\/revisions"}],"predecessor-version":[{"id":33251,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33250\/revisions\/33251"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}