Close Menu
Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Subscribe
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Aviation Analysis – Industry Travel NewsAviation Analysis – Industry Travel News
    Home»Tech»Zero-Day Attacks on Microsoft Exchange Server – Security Patches Are Missing
    Tech

    Zero-Day Attacks on Microsoft Exchange Server – Security Patches Are Missing

    Theodore MeeksBy Theodore MeeksSeptember 30, 2022No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email
    Zero-Day Attacks on Microsoft Exchange Server – Security Patches Are Missing
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Security researchers warn that attackers are currently exploiting two zero-day vulnerabilities in Microsoft Exchange Server. Security updates are not yet available. But there is an alternative.

    Malicious Code Attacks

    Security researchers from GTSC encountered the attacks. They summarized their findings in a report. According to them, attackers from the Chinese environment must successfully attack the Exchange Server and nest in the systems through backdoors. After successful attacks, malicious code can be executed. In addition, the developed site serves as a starting point for spreading to other systems.

    Meanwhile, other security researchers, including Trend Micro’s Zero Day Initiative (ZDI), have confirmed the vulnerabilities and attacks. Microsoft has not yet taken a stand.

    Details of the vulnerabilities are not available yet. CVE numbers are not set at this time. ZDI rates the vulnerabilities with CVSS score of 8.8 (ZDI-CAN-18333 and 6.3 (ZDI-CAN-18802) The attacks are expected to occur in the summer of 2021, similar to those with ProxyShell.

    Updates

    09/30/2022

    09:44

    hour

    According to security researchers, the documented attacks occurred on fully patched systems against ProxyShell.

    secure servers

    It is still unclear when the security patches will appear. In order to protect the systems now, GTSC security researchers have developed a temporary solution to block requests to initiate the attack. To do this, administrators must create a request block rule with the content under Autodiscover on the Rewrite URL tab

    .*autodiscover\.json.*\@.*Powershell.*

    Create the URL path. As a conditional entry, you must {REQUEST_URI} Choose.

    Administrators can use the following PowerShell command to check if servers have already been compromised.

    Get-ChildItem -Recurse -Path <Path_IIS_Logs> -Filter "*.log" | Select-String -Pattern 'powershell.*autodiscover\.json.*\@.*200'


    (From)

    to the home page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Theodore Meeks

    Lifelong foodaholic. Professional twitter expert. Organizer. Award-winning internet geek. Coffee advocate.

    Related Posts

    Neodymium Magnet Uses and Safety Tips for 2025

    October 4, 2025

    Halifax Stanfield Airport Pilots Passenger Service Robots in Bid to Boost Traveler Experience

    August 25, 2025

    Battery miracle in test – HP Omnibook X AI: If it takes longer again

    August 29, 2024
    Navigate
    • Home
    • Top News
    • World
    • Economy
    • Science
    • Tech
    • Sport
    • Entertainment
    • Contact Form
    Pages
    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    STAY UPTODATE

    Get the Latest News With Aviationanalysis.net

    OFFICE

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    QUERIES?

    Do you have any queries? Feel free to contact us via our Contact Form

    Visit Our Office

    X. Herald Inc.
    114 5th Ave New York,
    NY 10011, United States

    • About Us
    • DMCA
    • Contact Form
    • Privacy Policy
    • Editorial Policy
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.