• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

ProxyShell, Exchange Servers Under Attack Again

August 12, 2021 By Marc Laliberte

With the 2021 editions of the BlackHat and DEF CON security conferences all wrapped up, one of the presentation that made the biggest waves was the latest research from Orange Tsai of Devcore Security Consulting. Tsai was the researcher responsible for identifying and disclosing CVE-2021-26855, better known as ProxyLogon, to Microsoft back in January 2021, well before threat actors were found exploiting it in the wild in March. In his talk, titled “ProxyLogon is Just the Tip of the Iceburg: A New Attack Surface on Microsoft Exchange Server!” Tsai gave a deep dive into Microsoft Exchange Server’s architectures and the potential security weaknesses its complexity creates. During the talk, he discussed three additional vulnerabilities in Microsoft Exchange Server, dubbed ProxyShell, that Microsoft had luckily patched back in April and May.

CVE-2021-34473 – Microsoft Exchange Server Remote Code Execution Vulnerability

CVE-2021-34523 – Microsoft Exchange Server Elevation of Privilege Vulnerability

CVE-2021-31207 – Microsoft Exchange Server Security Feature Bypass Vulnerability

The vulnerabilities are similar to ProxyLogon in that an attacker only needs HTTPS access to the vulnerable Exchange server, something typically exposed by most administrators to enable Outlook Web Access. Since Tsai’s presentation at BlackHat, security researchers have identified adversaries exploiting ProxyShell in the wild attempting to gain remote access to vulnerable servers. The good news is, if you’re up-to-date on the latest patches for your Exchange server, you are already safe. If you haven’t, you’re getting closer to an “it’s already too late” scenario just like we saw with ProxyLogon back in late March.

If you’re a WatchGuard customer, we expect IPS signatures to become available within a day or two of this post.

Share This:

Related

Filed Under: Editorial Articles, Featured

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
  • TikTok is Banned, Kind Of
  • How Not to Update Software

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • How Not to Update Software
  • Naming APTs
  • TikTok is Banned, Kind Of
  • Scratching the Surface of Rhysida Ransomware
  • An Interview with ChatGPT
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use