Jump to content
  • Microsoft fixes ProxyNotShell Exchange zero-days exploited in attacks

    alf9872000

    • 348 views
    • 2 minutes
     Share


    • 348 views
    • 2 minutes

    Microsoft has released security updates to address two high-severity Microsoft Exchange zero-day vulnerabilities collectively known as ProxyNotShell and exploited in the wild.

     

    Attackers have been chaining the two security flaws to deploy Chinese Chopper web shells on compromised servers for persistence and data theft, as well as for lateral movement in their victims' networks since at least September 2022.

     

    Microsoft confirmed they were actively abused in attacks on September 30, saying it was "aware of limited targeted attacks using the two vulnerabilities to get into users' systems."

     

    "Microsoft is also monitoring these already deployed detections for malicious activity and will take necessary response actions to protect customers. We are working on an accelerated timeline to release a fix," the company added.

     

    The company later released mitigation measures to allow defenders to block incoming ProxyNotShell attacks but had to update the guidance twice after researchers showed that attackers could still bypass them.

     

    Admins warned to patch

    Today, as part of the November 2022 Patch Tuesday, Microsoft finally released security updates to address the two vulnerabilities.

     

    "Because we are aware of active exploits of related vulnerabilities (limited targeted attacks), our recommendation is to install these updates immediately to be protected against these attacks," the Exchange Team warned.

     

    "These vulnerabilities affect Exchange Server. Exchange Online customers are already protected from the vulnerabilities addressed in these SUs and do not need to take any action other than updating any Exchange servers in their environment."

     

    Tracked as CVE-2022-41082 and CVE-2022-41040, the two security bugs affect Microsoft Exchange Server 2013, 2016, and 2019.

     

    They enable attackers to escalate privileges to run PowerShell in the context of the system and gain arbitrary or remote code execution.

     

    "The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution," Microsoft added in the CVE-2022-41082 advisory.

     

    "As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call."

     

    The ProxyNotShell security flaws can only be exploited remotely by authenticated threat actors, however, in low-complexity attacks that don't require user interaction. 

     


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...