Critical vulnerabilities in the Exchange Email Server
Microsoft recently announced critical vulnerabilities in the Exchange Email Server product.
Exploits of these vulnerabilities can result in full compromise of an Exchange Server and/or unauthorized access of Exchange mailboxes. It is critical that companies act with all speed and due care in remediating this issue within their own environment and their supply chain.
To assist in identifying and triaging this issue within your vendor population, XeneX provides expert resources for forensic analysis, remediation and patching. XeneX utilizes the latest AI technology to identify if an environment is compromised and the remediation.
The individual Microsoft Exchange versions related to these vulnerabilities include:
OWA - Exchange Server 2010 SP3 (All updates)
OWA - Exchange Server 2013 CU23
OWA - Exchange Server 2016 CU18
OWA - Exchange Server 2016 CU19
OWA - Exchange Server 2019 CU7
OWA - Exchange Server 2019 CU8
In addition to the resources provided by XeneX, we also recommend customers utilize the detection and remediation tools provided by Microsoft and US-CERT:
Patches available through Microsoft:
Mitigations and Forensic indicators for Exchange Server:
https://us-cert.cisa.gov/ncas/alerts/aa21-062a
Microsoft Tool to Scan for IOC’s:
Please reach out to us with any questions you may have regarding this vulnerability.