NSA Identifies New Vulnerabilities in Microsoft Exchange Servers

April 14, 2021

In its April update, Microsoft addressed a total of 114 security vulnerabilities, including one actively exploited zero-day flaw and four remote code execution issues within Exchange Server. Among these vulnerabilities, 19 are classified as Critical, 88 as Important, and one as Moderate. Notably, CVE-2021-28310 is a privilege escalation vulnerability within Win32k, currently under active exploitation, allowing attackers to execute malicious code and gain elevated privileges on affected systems. Cybersecurity firm Kaspersky, which reported the flaw to Microsoft in February, connected the zero-day exploit to the Bitter APT group, known for utilizing a similar vulnerability (CVE-2021-1732) in attacks last year. “This is an escalation of privilege (EoP) exploit likely used in conjunction with other browser exploits to bypass sandboxes or obtain system privileges for further access,” explained Kaspersky researcher Boris Larin.

NSA Uncovers New Vulnerabilities Impacting Microsoft Exchange Servers

April 14, 2021

In a recent wave of updates, Microsoft addressed a total of 114 security vulnerabilities, prominent among them being a zero-day exploit and multiple remote code execution issues affecting Microsoft Exchange Servers. This April patch release is significant, as it reveals critical weaknesses that malicious actors could leverage. Of the identified vulnerabilities, 19 are classified as Critical, 88 as Important, and one as Moderate in severity.

Central to the list is CVE-2021-28310, a privilege escalation flaw within the Win32k component. Reports suggest this vulnerability is currently being actively exploited, granting attackers the ability to elevate their privileges by executing malicious code on affected systems. Kaspersky, a leading cybersecurity firm that identified this flaw earlier this year, has indicated a connection to a threat actor known as Bitter APT. This group previously exploited a similar vulnerability, CVE-2021-1732, in targeted attacks late last year.

The Bitter APT group’s operations serve as a reminder of the evolving threats facing organizations that utilize Microsoft Exchange Servers. Kaspersky researcher Boris Larin indicates that the escalating privilege exploit may be employed in conjunction with other vulnerabilities, particularly browser exploits, to escape sandbox environments and gain system-level access. This critical step not only highlights the potential for unauthorized system access but also raises concerns about the implications for sensitive data and operational integrity.

Targets of these vulnerabilities predominantly include businesses and organizations relying on Microsoft Exchange for email and communication, signifying the potential for widespread disruption. The primary focus of these attacks appears to center around entities in the United States, reflecting a broader trend of cyber threats aimed at compromising organizational security within this region.

From the perspective of the MITRE ATT&CK framework, various adversary tactics could apply to these incidents. Notably, initial access techniques may be used to infiltrate systems, followed by persistence mechanisms to maintain footholds within compromised environments. Furthermore, the privilege escalation techniques are crucial to advancing attackers’ capabilities, allowing them to exert greater control over the target systems.

As organizations navigate the complex landscape of cybersecurity threats, the latest findings from the NSA and Microsoft underscore the imperative for stringent security measures. Continuous monitoring, timely patch management, and a robust incident response strategy are vital components in mitigating the risks associated with these vulnerabilities. With the ever-evolving nature of cyber threats, business owners must remain vigilant and proactive in safeguarding their digital assets against potential exploitation.

Source link