Cloud Architect
Exchange administrators are aware of the Zero-day vulnerabilities CVE-2022-41040, Server-Side Request Forgery (SSRF) and CVE-2022-41082, Remote Code Execution (RCE) that were reported on September 29, 2022. Responding to these vulnerabilities, Microsoft initially released couple of immediate mitigations (URL Rewrite rule and Disable remote PowerShell access for non-admins) to be performed on the Exchange servers. Later, Microsoft released the security update KB5019758 on November 8, 2022, as a permanent fix for the zero-day vulnerabilities and declared the mitigations “URL rewrite rule” and “Disable remote PowerShell access for non-admins” as no longer recommended.
Recently, CrowdStrike – a leading Cybersecurity team has discovered a new exploit method called OWASSRF consisting of CVE-2022-41080 and CVE-2022-41082 to achieve remote code execution (RCE) to the Exchange servers through Outlook Web Access (OWA) which bypasses the URL rewrite mitigations for the Autodiscover endpoint.
What are the recommendations against the new exploit identified?
Helient strongly recommends taking the necessary steps to secure the Exchange servers from the active exploit which bypasses the mitigations that are no longer valid. If you would like more information or assistance, please contact our industry-leading experts at service@helient.com.