- Home
- Alerts & Advisories
- Alerts
- [UPDATE] Zero-day Vulnerabilities Affecting Microsoft Exchange Server
[UPDATE] Zero-day Vulnerabilities Affecting Microsoft Exchange Server
30 September 2022
Security researchers have discovered two zero-day vulnerabilities (CVE-2022-41040 and CVE-2022-41082) affecting Microsoft Exchange Server 2013, 2016, and 2019. These vulnerabilities are reportedly being actively exploited in the wild.
Successful exploitation of the vulnerabilities could allow an authenticated attacker to perform unauthorised Remote Code Execution (RCE) on a compromised system.
A patch for the vulnerabilities is currently not available. As a workaround, system administrators of affected on-premises Microsoft Exchange servers are advised to add a rule to block requests with indicators of attack through the URL Rewrite Rule module on the Internet Information Services (IIS) server, and block exposed Remote PowerShell ports (HTTP: 5985 and HTTPS: 5986) as soon as possible until a patch is made available.
Microsoft has confirmed that system administrators can refer to the following URL Rewrite Instructions to break the current chain of attack:
Open the IIS Manager.
Expand the Default Web Site.
Select Autodiscover.
In the Feature View, click URL Rewrite.
In the Actions pane on the right-hand side, click Add Rules.
Select Request Blocking and click OK.
Add String “.*autodiscover\.json.*\@.*Powershell.*” (excluding quotes) and click OK.
Expand the rule and select the rule with the Pattern “.*autodiscover\.json.*\@.*Powershell.*” and click Edit under Conditions.
Change the condition input from {URL} to {REQUEST_URI}.
System administrators can also consider running the following PowerShell command to search through their IIS logs to determine if their Exchange Servers have been compromised by the zero-day vulnerabilities.
Get-ChildItem -Recurse -Path -Filter "*.log" | Select-String -Pattern 'powershell.*autodiscover\.json.*\@.*200
System administrators are advised to refer to Microsoft's website for more detection techniques regarding the vulnerabilities and for patch updates.
More information is available here: