Mitigation for Exchange Servers Hafnium Zero-day vulnerabilities

18 March, 2021 | Technical

Even though it has been only a few months since the already famous attack on the SolarWinds supply chain, again we have to write about another hacking issue, this time related to Microsoft Exchange Server.

In this case, the Zero-day vulnerabilities found in Microsoft Exchange Server 2013, 2016, and 2019 permit an attacker to exploit them with impact to several organizations and businesses with on-premises Exchange Servers that enable access to email accounts and even installation of malware to allow long-term access to such servers. Microsoft detected the attacks from the Hafnium group, but also, others could have been using these 0-day exploits now that the attacks have been public.

These vulnerabilities have been registered and documented with the codes CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, and all of these have been addresses so urgent updates are strongly recommended to customers.

If you’re concerned about these attacks, we recommend implementing high availability solution plus a web application firewall in order to mitigate them, like the Relianoid solution. If the Exchange Server update is not possible, Microsoft recommends implementing the following mitigations:

1. Trusted users mitigation: Access to the Microsoft Exchange Servers for trusted users only via VPN service.
2. Backend Cookie Mitigation: Implement a Web Application Firewall rule to filter the malicious HTTPS requests using X-AnonResource-Backend and malformed X-BEResource cookies in the headers used in the SSRF attacks.
3. Unified Messaging mitigation: Disable UM
4. Exchange Control Panel mitigation: Disable ECP VDir
5. Offline Address Book mitigation: Disable OAB VDir

At RELIANOID, we’ve been working to implement those very easily via the WAF module and brand new VPN services. Also, high availability, additional security, and load balancing for Exchange Servers can be implemented with RELIANOID:

https://www.relianoid.com/knowledge-base/howtos/high-availability-and-site-resilience-for-microsoft-exchange-2016-owa-cas-array-and-dag/

Don’t doubt to contact us to have more details on how to implement those mitigations!

SHARE ON:

Related Blogs

Posted by reluser | 22 January 2025
Ubuntu 22.04 LTS users should act immediately to secure their systems after Canonical issued a critical security patch to address numerous vulnerabilities within the Linux kernel for Xilinx ZynqMP processors.…
57 LikesComments Off on Linux Kernel Vulnerabilities recently detected
Posted by reluser | 03 January 2025
In today's fast-evolving cybersecurity landscape, ensuring that only trusted software is allowed to run in an IT infrastructure is crucial. One fundamental mechanism for achieving this at the hardware level…
86 LikesComments Off on Enhancing Infrastructure Security with the implementation of Load Balancers with Secure Boot
Posted by reluser | 28 October 2024
The Hypertext Transfer Protocol (HTTP) is the foundation of data communication for the web. HTTP/2, the second major version of the protocol, represents a significant evolution from HTTP/1.1, designed to…
129 LikesComments Off on Understanding HTTP/2 Load Balancing