Zero-day vulnerabilities in Microsoft Exchange

This article is only applicable if you still have a Microsoft Exchange server on-premises (a physical server).

Microsoft has discovered two zero-day vulnerabilities in Exchange Server 2013, 2016 and 2019. Moreover, Microsoft has found that this is being actively exploited by cybercriminals. The NCSC (National Cyber Security Center) has designated this vulnerability with the risk factor partly for this reason high/high. That means there is a high probability that cybercriminals will take advantage of this and the potential damage that could result could be great.

The risk

The combination of the two vulnerabilities allow attackers to execute arbitrary code on a vulnerable Exchange Server. To do this, however, one must first log in with a user account. Because it does not matter what rights are assigned to the user account, an attacker can exploit this vulnerability with any user account from which login credentials have been obtained, such as in a previous data breach or other way in which login credentials have been captured. An Exchange Server can be completely taken over and install malicious code such as ransomware on it and get to your corporate data.

Microsoft's CVE code*: CVE-2022-41040 and CVE-2022-41082
* (CVE = Common Vulnerabilities and Exposures, a database containing information about IT vulnerabilities)

And now?

Is your company using Microsoft Server 2013, 2016 or 2019? No security updates have been made available at this time. However, there are temporary measures (mitigations) you can take that will prevent misuse. Microsoft has written a blog about this: click here

Of course you do not have to do this yourself, we have already contacted our clients. But should we be able to help your organization we will be happy to do so. Click here to contact include.

Recent blogs

kwantumcomputers
Blog
What are quantum computers? And why is everyone suddenly talking about them?
Chances are you've been hearing more and more about quantum computers in recent months. In the news, on LinkedIn, or perhaps even during conversations about AI and cybersecurity. Especially now that a Dutch chip developer is gaining global attention with a new generation of quantum chips, the technology suddenly seems closer than ever. But what exactly is a quantum computer? And why is so much expected of it? From Ordinary Computer to Quantum Computer To understand quantum computers, it's helpful to first look at how a normal computer works. A traditional computer — like your laptop or server — works with bits. A…
frankberry
Blog
With our feet in the mud
Here we are. Not quite recognizable anymore, thanks to AI trying to protect children. Understandable, of course. But believe us: these really are Berry and Frank. More than ten years apart, but in reality, we've always been brothers from another mother. And what do we have in common? A lot... and at the same time, almost nothing. Berry is often the good cop. Calm, down-to-earth, and always working to get things done. I'm usually the bad cop. Direct, critical, and always looking for ways to improve. But that combination is precisely what works. What completely unites us, though, is our love for...
Macadmins Leiden
Blog
MacAdmins Meeting: What's relevant for your organization?
Last week, we attended the MacAdmins Meeting in Leiden. It's a gathering focused on Apple administration, security, and innovation. What stood out? Developments are moving fast. But more importantly: they are becoming increasingly relevant for SMEs. We'd like to share the key insights with you. What's happening? And what does that mean for your organization? Running AI Locally: Control Over Data and Costs AI is now everywhere. But one question remains central: where does your data reside? A significant topic during the meeting was running AI models (LLMs) locally. Instead of relying on external cloud platforms, more and more...

A newsletter

Superlogic right?