Tuesday, November 12, 2024
Homecyber security80% of Exchange Servers Still Unpatched to Critical Remote Code Execution Vulnerability

80% of Exchange Servers Still Unpatched to Critical Remote Code Execution Vulnerability

Published on

Malware protection

Microsoft recently patched a remote code execution vulnerability with Microsoft Exchange Server that allows an attacker to use an Exchange user account to compromise the system completely.

The bug resides in the Exchange Control Panel (ECP) component, which can be used to manage mailboxes, Distribution Groups, Contacts at the mailbox level and several other objects at the Organization level.

Based on the Rapid 7 survey using Project Sonar over 350,000 Exchange servers with the vulnerability found exposed to online.

- Advertisement - SIEM as a Service

Project Sonar is a tool used to conduct internet-wide surveys across different services and protocols to gain insights into global exposure to common vulnerabilities.

Exchange Server Vulnerability

Based on the Project Sonar survey report more than 433,464 Exchange servers found to be online, at least 357,629 (82.5%) found to be vulnerable.

“Our remote, unauthenticated check doesn’t provide the version precision we’d need to be sure and our testing found that the related Microsoft update wasn’t always updating the build number, which leads to a degree of uncertainty,” reads the blog post.

Distribution Status

The report also states that over 31,000 Exchange 2010 servers were not updated since 2012 and 800 Exchange 2010 servers never been updated.

Multiple APT actors already attempting to exploit recently patched remote code execution bug in exchange email servers.

According to Microsoft the bug was due to a memory corruption vulnerability and could be exploited by an attacker by sending a crafted email sent to a vulnerable Exchange server.

Microsoft patched the vulnerability in February 2020, users are recommended to apply the updates for addressing the vulnerability.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VMware Workstation & Fusion Now Available for Free to All Users

VMware has announced that its popular desktop hypervisor products, VMware Workstation and VMware Fusion,...

Dell Enterprise SONiC Flaw Let Attackers Hijack the System

Dell Technologies has disclosed multiple critical security vulnerabilities in its Enterprise SONiC OS, which...

Amazon Confirms Employee Data Breach Via Third-party Vendor

Amazon has confirmed that sensitive employee data was exposed due to a breach at...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Maximizing Agent Productivity And Security With Workforce Management Software In Contact Centers

In the bustling world of customer service, the stakes are perpetually high—every missed call...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Understanding Crypto Macroeconomic Factors: Navigating Inflation, Rates, And Regulations 

Diving into the world of cryptocurrencies, I've found it's a fascinating intersection of technology...