Description Preview
Overview
This vulnerability affects Microsoft Exchange Server and is classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The vulnerability allows an authenticated attacker to write files to arbitrary locations on the server. It is part of a chain of vulnerabilities known collectively as ProxyLogon, which has been actively exploited in the wild.
The vulnerability exists in the Unified Messaging service of Exchange Server. By sending specially crafted requests, an attacker can write files to any path on the server. This can be leveraged to write web shells or other malicious code that can be executed on the server, leading to complete system compromise.
Affected products include:
- Microsoft Exchange Server 2013
- Microsoft Exchange Server 2016
- Microsoft Exchange Server 2019
Remediation
-
Apply the security updates released by Microsoft immediately. Microsoft has released out-of-band security updates for all affected versions of Exchange Server.
-
If you cannot apply patches immediately, implement the following mitigations:
- Restrict untrusted connections to Exchange Server
- Use a firewall to prevent external access to Exchange Server ports 443, 80, 25, and 465
- Disconnect vulnerable Exchange servers from the internet
-
Check for indicators of compromise:
- Look for web shells in the following paths:
- C:\inetpub\wwwroot\aspnet_client\
- C:\inetpub\wwwroot\aspnet_client\system_web\
- The Exchange Server installation path
- Check for suspicious files with extensions like .aspx, .ashx, .asmx, or .php
- Look for web shells in the following paths:
-
If compromise is suspected, consider:
- Rebuilding Exchange servers from known good sources
- Resetting credentials for any accounts with administrative access to Exchange
- Conducting a full security audit of your environment
References
- Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27065
- ProxyLogon Remote Code Execution Exploit: http://packetstormsecurity.com/files/161938/Microsoft-Exchange-ProxyLogon-Remote-Code-Execution.html
- ProxyLogon Collector Tool: http://packetstormsecurity.com/files/162736/Microsoft-Exchange-ProxyLogon-Collector.html
- Microsoft Security Blog on Exchange Server Vulnerabilities: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
- CISA Alert on Exchange Server Vulnerabilities: https://us-cert.cisa.gov/ncas/alerts/aa21-062a
Early Warning
Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.
- Armis Alert Date
- Mar 3, 2021
- CISA KEV Date
- Nov 3, 2021
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing: Medium
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- Public AdministrationPublic Administration: Low
- Finance and InsuranceFinance and Insurance: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- Retail TradeRetail Trade: Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- Educational ServicesEducational Services: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- UtilitiesUtilities: Low
- InformationInformation: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- ConstructionConstruction: Low
- MiningMining: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Wholesale TradeWholesale Trade: Low