Microsoft Exchange Servers Still At Risk To Actively Exploited Vulnerabilities!

According to Cybernetic Global Intelligence (CGI) cybersecurity auditors, majority of Microsoft Exchange Servers still need to be updated with a fix for a critical memory corruption vulnerability reported earlier this year. These unpatched servers are extremely vulnerable to attack.

Over 247,000 Microsoft Exchange servers must patch facing the vulnerability of CVE-2020-0688 post-auth remote code execution (RCE) affecting all Exchange Server versions under support.

In the Exchange Control Panel (ECP) component, enabled in default configurations, the CVE-2020-0688 RCE flaw exists and allows potential attackers to take over vulnerable Exchange servers remotely using any valid email credentials.

Microsoft addressed the security problem as part of the February 2020 patch Tuesday and tagged it with the ‘Exploitation More Likely’ exploitability index assessment, suggesting the vulnerability is an enticing target for hackers.

Microsoft released a patch for it, but updated Internet scan data from security vendor Rapid7 reveals many Internet-accessible Microsoft Exchange servers vulnerable to the reported loophole. Some run unsupported versions of Exchange, while others seem to have not patched:

  • 16,577 Exchange 2007 servers (out of support)
  • 54,000 Exchange 2010 servers (EOS in October 2020)
  • 67,000 Exchange 2013 servers (EOS in April 2023)
  • 120,000 Exchange 2016 servers
  • 19,000 Exchange 2019 servers

This news is disturbing! Cybercriminals may run the gambit of scams with administrative access to the Exchange servers of your organization. Like CEO fraud, brand and individual impersonation, business email breach, island hopping to infect or scam partners or customer organizations, and more.

According to CGI, Australia (Cybernetic Global Intelligence – an accredited PCI DSS QSA Cybersecurity), IT teams need to patch any supported Exchange Server versions immediately and formulate a strategy to switch off any unsupported versions soon and reduce Internet-based access to the Exchange environment.

What’s the Fix, and how to safeguard from it?

Recently Cybernetic GI Security Bulletin has published a summary of ‘CWE Top 25 Most Dangerous Software Weaknesses in 2020‘. It was indeed a well-versed one. And the report depicts that no one is safe from these malicious data breaches since the cyber-actors are getting severe day by day.

So, the big question here is, do you have a dedicated team for I.T. security and support? Have you tested your systems recently by a cybersecurity firm? If not, there are chances that your security stance is absent. For the right network security, you need to conduct security audits on your systems by cyber security experts.

You can depend on Cybernetic Global Intelligence for all of your technology and security requirements. We provide technology solutions that eliminate risks while reducing costs.

So don’t leave your business or organization vulnerable anymore. Contact us today and boost your company’s security and success.

Post a Comment