Wednesday, March 29, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Researchers bypass Exchange zero-day vulnerability mitigation

Researchers bypass Exchange zero-day vulnerability mitigation

The mitigation shared by Microsoft for two zero-day exchange vulnerabilities can't stop attacks targeting on-premise servers.


Erdem Yasar Erdem Yasar
October 4, 2022
2 min read
Researchers bypass Exchange zero-day vulnerability mitigation
  • Cybersecurity researchers state that the URL pattern in the mitigation method of Exchange zero-day vulnerability can be bypassed easily.
  • According to cybersecurity researchers, “@” in the URL block “seems unnecessarily precise, and therefore insufficient.”
  • The vulnerability is still under attack and Microsoft didn’t release a patch to address the vulnerabilities yet, leaving users vulnerable to attacks.

Two new zero-day vulnerabilities are giving Microsoft to have a hard time. Microsoft Exchange zero-day vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082 are currently being exploited in the wild, allowing hackers to breach servers and achieve remote code execution. Vulnerabilities were reported through the Zero Day Initiative approximately three weeks ago and GTSC shared the details last week.

Not fixed yet

Until now, Microsoft didn’t release any fixes that address the vulnerabilities yet, leaving users vulnerable to incoming attacks. In the advisory, the tech giant shared mitigation to help users protect their servers, urging users to disable remote PowerShell access for non-admin users. Microsoft’s solution focuses on blocking known attack patterns by using a rule in the IIS Manager. The current mitigation is to add a blocking rule in “IIS Manager -> Default Web Site -> Autodiscover -> URL Rewrite -> Actions” to block the known attack patterns. 

  • Open the IIS Manager. 
  • Expand the Default Web Site. 
  • Select Autodiscover. 
  • In the Feature View, click URL Rewrite. 
  • In the Actions pane on the right-hand side, click Add Rules.  
  • Select Request Blocking and click OK. 
  • Add String “.*autodiscover\.json.*\@.*Powershell.*” (excluding quotes) and click OK. 
  • Expand the rule and select the rule with the Pattern “.*autodiscover\.json.*\@.*Powershell.*” and click Edit under Conditions. 
  • Change the condition input from {URL} to {REQUEST_URI} 

The '@' in the Microsoft-recommended ".*autodiscover.json.*@.*Powershell.*" URL block mitigations for CVE-2022-41040 CVE-2022-41082 seems unnecessarily precise, and therefore insufficient. Video:https://t.co/63VBV5o9Cr
Probably try ".*autodiscover.json.*Powershell.*" instead. https://t.co/uX1oE975Lm pic.twitter.com/NZy8tEvryZ

— Will Dormann (@wdormann) October 3, 2022

Unfortunately, this method is only effective against known attacks, thus, the URL pattern is limited to them. Security researchers pinpoint that this temporary solution is not enough and can be bypassed easily. Security researcher Jang tweeted the issue with the mitigation and it is confirmed by ANALYGENCE, who stated that “@” in the URL block “seems unnecessarily precise, and therefore insufficient.” GTSC also published a video that confirms that mitigation can’t provide sufficient protection.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Microsoft Exchange Server
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Google Cloud Next '22 kicks off on October 11

Google Cloud Next '22 kicks off on October 11

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • What is Nvidia Canvas? Everything you need to know
  • How to install and run Android apps on Windows
  • A new storage and optic communication tech is on the way
  • Interview: Pete Morgan, co-founder and CSO of Phylum
  • Trisquel GNU/Linux 11.0 released, download now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.