Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть Microsoft patched several Zero days in Exchange Servers Exploited in the Wild!

  • Terabitweb CyberSecurity News
  • 2021-03-07
  • 800
Microsoft patched several Zero days in Exchange Servers Exploited in the Wild!
  • ok logo

Скачать Microsoft patched several Zero days in Exchange Servers Exploited in the Wild! бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно Microsoft patched several Zero days in Exchange Servers Exploited in the Wild! или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку Microsoft patched several Zero days in Exchange Servers Exploited in the Wild! бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео Microsoft patched several Zero days in Exchange Servers Exploited in the Wild!

Update 3/13/2021:
New Alert from CISA including more Malware Analysis
https://us-cert.cisa.gov/ncas/alerts/...

Update 3/10/2021
FBI-CISA Joint Advisory on Compromise of Microsoft Exchange Server
https://us-cert.cisa.gov/ncas/current...

Updates:
Possibly over 30,0000 companies using Exchange Server affected.
https://krebsonsecurity.com/2021/03/a...

https://krebsonsecurity.com/2021/03/w...

Possible Ransomware on some Exchange Servers affected by these exploits called DoejoCrypt
https://www.scmagazine.com/home/secur...

Possibly up to 10 criminal hacking groups attacking these unpatched Exchange Servers
https://www.scmagazine.com/home/secur...

Microsoft Urges anyone with an Exchange Server to patch immediately.
Microsoft explains the CVEs in their blog post
“CVE-2021-26855 is a server-side request forgery (SSRF) vulnerability.” An attacker can send specially crafted HTTP requests to the server and get authenticated as the exchange server itself.
“CVE-2021-26857 is an insecure deserialization vulnerability in the Unified Messaging service.” An attacker can use this vulnerability to run any code as SYSTEM and would require administrative privileges to perform this exploit.
“CVE-2021-26858 is a post-authentication arbitrary file write vulnerability in Exchange.” Any attacker that has been able to authenticate to the server will be allowed to write a file anywhere on the server.
“CVE-2021-27065 is a post-authentication arbitrary file write vulnerability in Exchange.” This is another vulnerability like above and allows an authenticated user to write a file anywhere on the server. Both CVE-2021-26858 and CVE-2021-27065 could use the first exploit, CVE-2021-26855, to serve as the authenticated session to use either of these last two exploits.
Microsoft lays out in their article about how to detect if the server has been compromised. Administrators, for instance, can check the logs for AuthenticatedUsers where there is no username listed and the AnchorMailbox is listed as “ServerInfo~*/*” a sample powershell command Microsoft provides is
Import-Csv -Path (Get-ChildItem -Recurse -Path "$env:PROGRAMFILES\Microsoft\Exchange Server\V15\Logging\HttpProxy" -Filter '*.log').FullName | Where-Object { $_.AuthenticatedUser -eq '' -and $_.AnchorMailbox -like 'ServerInfo~*/*' } | select DateTime, AnchorMailbox
After finding the Criteria above one can look to which program is associated with the AnchorMailbox path can be explored by reviewing logs in %PROGRAMFILES%\Microsoft\Exchange Server\V15\Logging
The above is just the information to see if an exchange server if the vulnerability was exploited in CVE-2021-26855.

If looking to see if you were affected by CVE-2021-27065, check the following log files in C:\Program Files\Microsoft\Exchange Server\V15\Logging\ECP\Server
“All Set-<AppName>VirtualDirectory properties should never contain script. InternalUrl and ExternalUrl should only be valid Uris.”

Following is a PowerShell command to search for potential exploitation:
Select-String -Path "$env:PROGRAMFILES\Microsoft\Exchange Server\V15\Logging\ECP\Server\*.log" -Pattern 'Set-.+VirtualDirectory'

More Detailed information for the other CVEs is listed in https://www.microsoft.com/security/bl...

Microsoft has found Multiple shells from this group in the following directories
%PROGRAMFILES%\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\owa\auth\
C:\Exchange\FrontEnd\HttpProxy\owa\auth\
C:\inetpub\wwwroot\aspnet_client\
C:\inetpub\wwwroot\aspnet_client\system_web\
The following names of Webshells were found
web.aspx
help.aspx
document.aspx
errorEE.aspx
errorEEE.aspx
errorEW.aspx
errorFF.aspx
healthcheck.aspx
aspnet_www.aspx
aspnet_client.aspx
xx.aspx
shell.aspx
aspnet_iisstart.aspx
one.aspx
Sources:

Many more diagnostic and information about these threats are available on the Microsoft site below https://www.microsoft.com/security/bl...
Mitigations and Forensic Analysis at https://us-cert.cisa.gov/ncas/alerts/...
Sources:
https://www.microsoft.com/security/bl...
https://techcommunity.microsoft.com/t...
https://us-cert.cisa.gov/ncas/alerts/...

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]