Zero-day vulnerabilities in Microsoft Exchange

This article is only applicable if you still have a Microsoft Exchange server on-premises (a physical server).

Microsoft has discovered two zero-day vulnerabilities in Exchange Server 2013, 2016 and 2019. Moreover, Microsoft has found that this is being actively exploited by cybercriminals. The NCSC (National Cyber Security Center) has designated this vulnerability with the risk factor partly for this reason high/high. That means there is a high probability that cybercriminals will take advantage of this and the potential damage that could result could be great.

The risk

The combination of the two vulnerabilities allow attackers to execute arbitrary code on a vulnerable Exchange Server. To do this, however, one must first log in with a user account. Because it does not matter what rights are assigned to the user account, an attacker can exploit this vulnerability with any user account from which login credentials have been obtained, such as in a previous data breach or other way in which login credentials have been captured. An Exchange Server can be completely taken over and install malicious code such as ransomware on it and get to your corporate data.

Microsoft's CVE code*: CVE-2022-41040 and CVE-2022-41082
* (CVE = Common Vulnerabilities and Exposures, a database containing information about IT vulnerabilities)

And now?

Is your company using Microsoft Server 2013, 2016 or 2019? No security updates have been made available at this time. However, there are temporary measures (mitigations) you can take that will prevent misuse. Microsoft has written a blog about this: click here

Of course you do not have to do this yourself, we have already contacted our clients. But should we be able to help your organization we will be happy to do so. Click here to contact include.

Recent blogs

apple header
Blog
Apple 50 Years: 50 Years of Daring to Think Differently
This year, Apple celebrates its 50th anniversary. A milestone that cannot simply be overlooked. Because whether you are a fan or not: Apple has permanently changed the way we work, communicate, and create. At Analyst ICT, we are proud to be part of this ecosystem. As an Apple Technical Partner, we work daily with technology that is not only powerful but, above all, logical and pleasant to use. A different perspective on technology Apple has always distinguished itself by one simple conviction: technology should help people, not hinder them. No unnecessary complexity, but simplicity and ease of use. That aligns seamlessly...
browser password
Blog
Why saving passwords in your browser is not a good idea
The blog post below was created in response to a question during our engineering meeting. Every two weeks, we get together with all of our technical staff to discuss the latest developments in technology or with clients. Good client questions also arise during these meetings, such as this one. Time to do some research. Thank you, Wiebe! You've probably experienced this: you log in to a website, and your browser asks if it should remember your password. Convenient, fast, and you don't have to remember anything. However, there's a risk involved. In practice, we see that many security incidents start with something small. Like saving passwords…
Apple Business
Blog
Apple is taking a big step with Apple Business
Apple announced something special this week. Not a new device, but something that might be even more interesting for many organizations: Apple Business. A completely new platform with which Apple brings all its business services together in one environment. And frankly: this is a development that we at Analyst ICT are following with great interest. The problem: fragmented tools and unnecessary complexity Many organizations working with Apple will recognize the problem: Multiple portals (Apple Business Manager, Business Essentials, Connect) Different tools for management, branding, and support Additional costs for basic functionalities such as device management This leads to a lack of clarity and costs time. And…

A newsletter

Superlogic right?