Security News > 2022 > September > WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems.
"We detected webshells, mostly obfuscated, being dropped to Exchange servers," the company noted.
"Using the user-agent, we detected that the attacker uses Antsword, an active Chinese-based open source cross-platform website administration tool that supports web shell management."
Html Exchange Server vulnerabilities, with GTSC noting that the targeted servers had already been patched against the flaws that came to light in March 2021.
It's worth noting that the China Chopper web shell was also deployed by Hafnium, a suspected state-sponsored group operating out of China, when the ProxyShell vulnerabilities were subjected to widespread exploitation last year.
"If you don't run Microsoft Exchange on premise, and don't have Outlook Web App facing the internet, you are not impacted," Beaumont said.
News URL
https://thehackernews.com/2022/09/warning-new-unpatched-microsoft.html
Related news
- Qualcomm zero-day under targeted exploitation (CVE-2024-43047) (source)
- Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws (source)
- Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572) (source)
- Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools (source)
- CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094) (source)
- Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 91 flaws (source)
- Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws (source)
- Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) (source)
- Microsoft Exchange adds warning to emails abusing spoofing flaw (source)
- Microsoft patches Windows zero-day exploited in attacks on Ukraine (source)