Lucene search

K
thnThe Hacker NewsTHN:8200D2C2E1DD329D680C5E699177551B
HistoryOct 08, 2022 - 5:13 a.m.

Microsoft Issues Improved Mitigations for Unpatched Exchange Server Vulnerabilities

2022-10-0805:13:00
The Hacker News
thehackernews.com
215
microsoft
exchange server
vulnerabilities
mitigations
unpatched
security flaws
patch tuesday
proxynotshell
cve-2022-41040
cve-2022-41082
remote code execution
state-sponsored
threat actor
targeted attacks
iis manager
url rewrite
powershell-based tool

EPSS

0.947

Percentile

99.3%

Exchange Server Vulnerabilities

Microsoft on Friday disclosed it has made more improvements to the mitigation method offered as a means to prevent exploitation attempts against the newly disclosed unpatched security flaws in Exchange Server.

To that end, the tech giant has revised the blocking rule in IIS Manager from “.*autodiscover\.json.Powershell.” to “(?=.*autodiscover\.json)(?=.*powershell).”

The list of updated steps to add the URL Rewrite rule is below -

  • Open IIS Manager
  • Select Default Web Site
  • In the Feature View, click URL Rewrite
  • In the Actions pane on the right-hand side, click Add Rule(s)…
  • Select Request Blocking and click OK
  • Add the string “(?=.*autodiscover\.json)(?=.*powershell)” (excluding quotes)
  • Select Regular Expression under Using
  • Select Abort Request under How to block and then click OK
  • Expand the rule and select the rule with the pattern: (?=.*autodiscover\.json)(?=.*powershell) and click Edit under Conditions
  • Change the Condition input from {URL} to {UrlDecode:{REQUEST_URI}} and then click OK

Alternatively, users can achieve the desired protections by executing a PowerShell-based Exchange On-premises Mitigation Tool (EOMTv2.ps1), which has also been updated to take into account the aforementioned URL pattern.

The actively-exploited issues, called ProxyNotShell (CVE-2022-41040 and CVE-2022-41082), are yet to be addressed by Microsoft, although with Patch Tuesday right around the corner, the wait may not be for long.

Successful weaponization of the flaws could enable an authenticated attacker to chain the two vulnerabilities to achieve remote code execution on the underlying server.

The tech giant, last week, acknowledged that the shortcomings may have been abused by a single state-sponsored threat actor since August 2022 in limited targeted attacks aimed at less than 10 organizations worldwide.

Update: Microsoft, over the weekend, said that it has once again made a correction to the URL string – “(?=.*autodiscover)(?=.*powershell)” – to be added to the blocking rule in IIS Manager to prevent exploitation attempts.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.