Mitigation for Exchange Servers Hafnium Zero-day vulnerabilities

18 March, 2021 | Technical

Even though it has been only a few months since the already famous attack on the SolarWinds supply chain, again we have to write about another hacking issue, this time related to Microsoft Exchange Server.

In this case, the Zero-day vulnerabilities found in Microsoft Exchange Server 2013, 2016, and 2019 permit an attacker to exploit them with impact to several organizations and businesses with on-premises Exchange Servers that enable access to email accounts and even installation of malware to allow long-term access to such servers. Microsoft detected the attacks from the Hafnium group, but also, others could have been using these 0-day exploits now that the attacks have been public.

These vulnerabilities have been registered and documented with the codes CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, and all of these have been addresses so urgent updates are strongly recommended to customers.

If you’re concerned about these attacks, we recommend implementing high availability solution plus a web application firewall in order to mitigate them, like the Relianoid solution. If the Exchange Server update is not possible, Microsoft recommends implementing the following mitigations:

1. Trusted users mitigation: Access to the Microsoft Exchange Servers for trusted users only via VPN service.
2. Backend Cookie Mitigation: Implement a Web Application Firewall rule to filter the malicious HTTPS requests using X-AnonResource-Backend and malformed X-BEResource cookies in the headers used in the SSRF attacks.
3. Unified Messaging mitigation: Disable UM
4. Exchange Control Panel mitigation: Disable ECP VDir
5. Offline Address Book mitigation: Disable OAB VDir

At RELIANOID, we’ve been working to implement those very easily via the WAF module and brand new VPN services. Also, high availability, additional security, and load balancing for Exchange Servers can be implemented with RELIANOID:

https://www.relianoid.com/knowledge-base/howtos/high-availability-and-site-resilience-for-microsoft-exchange-2016-owa-cas-array-and-dag/

Don’t doubt to contact us to have more details on how to implement those mitigations!

SHARE ON:

Related Blogs

Posted by reluser | 28 October 2024
The Hypertext Transfer Protocol (HTTP) is the foundation of data communication for the web. HTTP/2, the second major version of the protocol, represents a significant evolution from HTTP/1.1, designed to…
60 LikesComments Off on Understanding HTTP/2 Load Balancing
Posted by reluser | 30 September 2024
Operational Support Systems (OSS) and Business Support Systems (BSS) are vital for the efficient functioning of telecommunications companies, such as mobile, fixed-line, and Internet operators. These systems serve different purposes…
75 LikesComments Off on OSS/BSS reliability for Telecom industry support systems
Posted by reluser | 26 July 2024
The Netdev 0x18 Conference, held from July 15th to 19th, 2024, in Santa Clara, California, brought together leading minds in Linux networking for a week of insightful presentations, technical sessions,…
125 LikesComments Off on Netdev Conference 0x18: A Deep Dive into the Future of Linux Networking