9 August 2021

Hackers actively scanning for Microsoft Exchange servers with ProxyShell vulnerabilities


Hackers actively scanning for Microsoft Exchange servers with ProxyShell vulnerabilities

Threat actors are actively searching for the Microsoft Exchange ProxyShell critical vulnerabilities. The attacks began after cybersecurity researchers showed technical details of these problems at the Black Hat conference.

ProxyShell attacks involve the exploitation of three vulnerabilities that allows unauthenticated hackers to perform remote code execution on Microsoft Exchange servers. Vulnerabilities are exploited remotely through Microsoft Exchange's Client Access Service (CAS) running on port 443 in IIS.

The three ProxyShell vulnerabilities are CVE-2021-34473 (Pre-auth Path Confusion leads to ACL Bypass), CVE-2021-34523 (Elevation of Privilege on Exchange PowerShell Backend) and CVE-2021-31207 (Post-auth Arbitrary-File-Write leads to RCE). CVE-2021-34473 and CVE-2021-34523 were disclosed in July, but these problems were fixed earlier, in April's Microsoft Exchange KB5001779 cumulative update.

Security researcher Orange Tsai told at Black Hat about recent Microsoft Exchange vulnerabilities he discovered when targeting the Microsoft Exchange Client Access Service (CAS) attack surface. One of the parts of the ProxyShell attacks targets the Microsoft Exchange Autodiscover service, which helps mail client software to auto-configure itself with minimal interactions with the user.

Security researchers PeterJson and Jang published technical information about the successful reproduce of the ProxyShell exploit. Later researcher Kevin Beaumont told about hackers, that tried to attack his Microsoft Exchange honeypot against the server's Autodiscover service. Initial attempts failed, but then more details about the vulnerabilities were disclosed and attackers modified their scans to use the new Autodiscover URL. Accessing the URL will cause the ASP.NET worker process (w3wp.exe) to compile a web application.

It is highly recommended for administrators to use Azure Sentinel to check IIS logs for the "/autodiscover/autodiscover.json" or "/mapi/nspi/" strings. If they will find a targeted Autodiscover URL, it means that threat actors were looking for the vulnerable server. Microsoft Exchange admins must install the latest cumulative updates to protect systems from these vulnerabilities.

There are currently 400,000 Microsoft Exchange servers exposed on the Internet, so there are bound to be successful attacks.

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024