Microsoft Exchange servers vulnerable

28,500 Microsoft Exchange servers have now been confirmed to be vulnerable to elevation of privilege. This puts affected organizations worldwide at significant risk, as many users are connected to Exchange for work.

The attack surface may be even larger. In fact, the threat monitoring service Shadowserver has 97,000 servers identified as ‘potentially vulnerable. This depends on the measures administrators have taken. Shadowserver has no visibility into whether these 68,500 potentially vulnerable servers have been patched, but again refers to the Microsoft documentation.

With just over 3,000 cases, the Netherlands is among the hardest hit countries. Belgium is less affected, with about 1,000 servers. Germany tops the list by far, with nearly 23,000 Shadowserver reports.

At issue is an elevation of privilege (EoP) vulnerability in Exchange Server. The bug allows a cybercriminal to pass a leaked Net-NTLMv2 hash to a vulnerable Exchange server to authenticate as that user. Hackers could potentially crack NTLM hashes or deploy an NTLM relay attack.

“An attacker can target an NTLM client, such as Outlook, with an NTLM data leakage vulnerability type,” said Microsoft in warning. The leaked login credentials allow malicious actors to gain additional privileges in the network and attack targets from the Exchange Server.

Solution

Until now, Exchange Server did not have relay protection enabled by default for NTLM credentials. Microsoft is now going to change that, by enabling so-called Extended Protection (EP) by default on all Exchange Servers. This will require installing the 2024 H1 Cumulative Update.

Of course we take care of this for you, super logical for us! Do you need help, or do you want to know if your organization's exchange server is secure please take a moment contact with us.

Source: technzine

Recent blogs

kwantumcomputers
Blog
What are quantum computers? And why is everyone suddenly talking about them?
Chances are you've been hearing more and more about quantum computers in recent months. In the news, on LinkedIn, or perhaps even during conversations about AI and cybersecurity. Especially now that a Dutch chip developer is gaining global attention with a new generation of quantum chips, the technology suddenly seems closer than ever. But what exactly is a quantum computer? And why is so much expected of it? From Ordinary Computer to Quantum Computer To understand quantum computers, it's helpful to first look at how a normal computer works. A traditional computer — like your laptop or server — works with bits. A…
frankberry
Blog
With our feet in the mud
Here we are. Not quite recognizable anymore, thanks to AI trying to protect children. Understandable, of course. But believe us: these really are Berry and Frank. More than ten years apart, but in reality, we've always been brothers from another mother. And what do we have in common? A lot... and at the same time, almost nothing. Berry is often the good cop. Calm, down-to-earth, and always working to get things done. I'm usually the bad cop. Direct, critical, and always looking for ways to improve. But that combination is precisely what works. What completely unites us, though, is our love for...
Macadmins Leiden
Blog
MacAdmins Meeting: What's relevant for your organization?
Last week, we attended the MacAdmins Meeting in Leiden. It's a gathering focused on Apple administration, security, and innovation. What stood out? Developments are moving fast. But more importantly: they are becoming increasingly relevant for SMEs. We'd like to share the key insights with you. What's happening? And what does that mean for your organization? Running AI Locally: Control Over Data and Costs AI is now everywhere. But one question remains central: where does your data reside? A significant topic during the meeting was running AI models (LLMs) locally. Instead of relying on external cloud platforms, more and more...

A newsletter

Superlogic right?