A New privilege escalation zero-day vulnerability discovered in Microsoft Exchange server that allows an attacker to gain admin privilege through a set of 3 critical attack vector.
Active Directory and Exchange used by most
There are 3 combination of attack would be possible by this zero-day flaw in Microsoft Exchange.
- Exchange Servers have (too) high privileges by default
- NTLM authentication is vulnerable to relay attacks
- Exchange has a feature which makes it authenticate to an attacker with the computer account of the Exchange server
Default Highest Privilege on Exchange server
A First and Important vulnerability that took in Active Directory domain which has highest privilege in Exchange .
Exchange Windows Permissions group has
WriteDacl access on the Domain object in Active Directory, which enables any member of this group to modify the domain privileges “
By having this privilege by an attacker can able to synchronize all the hashed passwords of users in the Active Directory.
NTLM Relaying Attack
NTLM Relaying attack can be performed when authentication is relayed to LDAP, objects in the directory can be modified to grant an attacker privilege.
LDAP, which can be used to read and modify objects in the (Active) directory.
In this case, ACL attack can be performed if Attacker can have an Exchange server to authenticate with NTLM authentication.
According to Researcher, “it is possible to pass authentication that is performed (automatically) by Windows when it connects to the attacker’s machine on to other machines in the network”
In order to authenticate with Exchange ZDI researcher discovered that it is possible to get Exchange to authenticate to an arbitrary URL over HTTP via the Exchange
Escalate the Privilege via This Zero-day Flaw
The first Step this attack targets the domain controller and supply a user under the attacker’s control to escalate the privilege using
This attack was performed by Compromised Credentials but
A proof-of-concept tool also released for this attack which dubbed by