Microsoft bestätigt 2 neue Exchange Zero-Day-Schwachstellen, die in freier Wildbahn genutzt werden

Teilen:

Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and 2019 following reports of in-the-wild exploitation.

“The first vulnerability, identified as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is accessible to the attacker,” the tech giant sagte.

The company also confirmed that it’s aware of “limited targeted attacks” weaponizing the flaws to obtain initial access to targeted systems, but emphasized that authenticated access to the vulnerable Exchange Server is required to achieve successful exploitation.

The attacks detailed by Einkaufsmodus Microsoft show that the two flaws are stringed together in an exploit chain, with the SSRF bug enabling an authenticated adversary to remotely trigger arbitrary code execution.

The Redmond-based company further emphasized that it’s working on an “accelerated timeline” to push a fix, while urging on premises Einkaufsmodus Microsoft Exchange customers to add a blocking rule in IIS Manager as a temporary workaround to mitigate potential threats.

It’s worth noting that Microsoft Exchange Online Customers are not affected. The steps to add the blocking rule are as follows –

  • Open the IIS Manager
  • Expand the Default Web Site
  • Select Autodiscover
  • In the Feature View, click URL Rewrite
  • In the Actions pane on the right-hand side, click Add Rules
  • Select Request Blocking and click OK
  • Add String “.*autodiscover.json.*@.*Powershell.*” (excluding quotes) and click OK
  • Expand the rule and select the rule with the Pattern “.*autodiscover.json.*@.*Powershell.*” and click Edit under Conditions
  • Change the condition input from {URL} to {REQUEST_URI}

https://thehackernews.com/2022/09/microsoft-confirms-2-new-exchange-zero.html

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:34 pm, Juli 8, 2025
Wetter-Symbol 24°C
L: 23° | H: 25°
klarer Himmel
Luftfeuchtigkeit: 35 %
Druck: 1018 mb
Wind: 8 mph WNW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 8%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:53 am
Sonnenuntergang: 9:17 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
23° | 25°°C 0 mm 0% 4 mph 37 % 1018 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
16° | 26°°C 0.16 mm 16% 8 mph 58 % 1022 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 11 mph 76 % 1024 mb 0 mm/h
Fr. Juli 11 10:00 pm
Wetter-Symbol
19° | 29°°C 0 mm 0% 8 mph 65 % 1022 mb 0 mm/h
Sa. Juli 12 10:00 pm
Wetter-Symbol
19° | 29°°C 0 mm 0% 10 mph 65 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
20° | 23°°C 0 mm 0% 4 mph 37 % 1018 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
18° | 20°°C 0 mm 0% 5 mph 45 % 1019 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 4 mph 58 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 4 mph 51 % 1021 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 6 mph 58 % 1022 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 8 mph 56 % 1022 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
26° | 26°°C 0.16 mm 16% 8 mph 43 % 1021 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 4 mph 49 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€93,008.57
1.18%
Ethereum(ETH)
€2,232.72
3.59%
Fesseln(USDT)
€0.85
0.00%
XRP(XRP)
€1.98
1.07%
Solana(SOL)
€129.76
1.58%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.146036
2.62%
Shiba Inu(SHIB)
€0.000010
3.74%
Pepe(PEPE)
€0.000009
3.23%
Nach oben scrollen