9 August 2021

Hackers actively scanning for Microsoft Exchange servers with ProxyShell vulnerabilities


Hackers actively scanning for Microsoft Exchange servers with ProxyShell vulnerabilities

Threat actors are actively searching for the Microsoft Exchange ProxyShell critical vulnerabilities. The attacks began after cybersecurity researchers showed technical details of these problems at the Black Hat conference.

ProxyShell attacks involve the exploitation of three vulnerabilities that allows unauthenticated hackers to perform remote code execution on Microsoft Exchange servers. Vulnerabilities are exploited remotely through Microsoft Exchange's Client Access Service (CAS) running on port 443 in IIS.

The three ProxyShell vulnerabilities are CVE-2021-34473 (Pre-auth Path Confusion leads to ACL Bypass), CVE-2021-34523 (Elevation of Privilege on Exchange PowerShell Backend) and CVE-2021-31207 (Post-auth Arbitrary-File-Write leads to RCE). CVE-2021-34473 and CVE-2021-34523 were disclosed in July, but these problems were fixed earlier, in April's Microsoft Exchange KB5001779 cumulative update.

Security researcher Orange Tsai told at Black Hat about recent Microsoft Exchange vulnerabilities he discovered when targeting the Microsoft Exchange Client Access Service (CAS) attack surface. One of the parts of the ProxyShell attacks targets the Microsoft Exchange Autodiscover service, which helps mail client software to auto-configure itself with minimal interactions with the user.

Security researchers PeterJson and Jang published technical information about the successful reproduce of the ProxyShell exploit. Later researcher Kevin Beaumont told about hackers, that tried to attack his Microsoft Exchange honeypot against the server's Autodiscover service. Initial attempts failed, but then more details about the vulnerabilities were disclosed and attackers modified their scans to use the new Autodiscover URL. Accessing the URL will cause the ASP.NET worker process (w3wp.exe) to compile a web application.

It is highly recommended for administrators to use Azure Sentinel to check IIS logs for the "/autodiscover/autodiscover.json" or "/mapi/nspi/" strings. If they will find a targeted Autodiscover URL, it means that threat actors were looking for the vulnerable server. Microsoft Exchange admins must install the latest cumulative updates to protect systems from these vulnerabilities.

There are currently 400,000 Microsoft Exchange servers exposed on the Internet, so there are bound to be successful attacks.

Back to the list

Latest Posts

Cyber Security Week in Review: November 8, 2024

Cyber Security Week in Review: November 8, 2024

In brief: PAN Expedition bug exploited in the wild, 22,000+ servers and IPs linked to cybercrime disrupted, and more.
8 November 2024
Germany proposes new law to protect security researchers and toughen penalties for cybercrime

Germany proposes new law to protect security researchers and toughen penalties for cybercrime

The draft law also imposes harsher penalties for severe cases of spying on or intercepting data.
7 November 2024
North Korean hackers target crypto firms with new macOS malware in Hidden Risk campaign

North Korean hackers target crypto firms with new macOS malware in Hidden Risk campaign

The campaign involves a multi-stage malware that infects Apple macOS devices.
7 November 2024