Microsoft Exchange Critical Vulnerability Alert – ZDI-23-1578, ZDI-23-1579, ZDI-23-1580, ZDI-23-1581

ZDI-23-1578

ZDI-23-1579 

ZDI-23-1580

ZDI-23-1581

Discovered: 9/7/2023

Impacted Tech: Microsoft Exchange

Attacker Requirements: Authentication

Highlights:

Trend Micro’s Zero Day Initiative (ZDI) has recently disclosed four zero-day vulnerabilities that can be exploited by attackers to remotely execute arbitrary code or disclose sensitive information on affected installations.

Microsoft has decided to delay the release of fixes for these vulnerabilities, citing that the flaws were not deemed severe enough to warrant immediate servicing.

The first vulnerability, ZDI-23-1578, is a remote code execution (RCE) flaw that allows attackers to deserialize untrusted data. A successful exploitation of this vulnerability would grant an attacker the ability to execute arbitrary code with the highest level of privileges on Windows, known as ‘SYSTEM.’ Fortunately, this vulnerability has been patched in the August 2023 security update.

ZDI-23-1579 can enable an attacker to access sensitive information on Exchange servers due to insufficient URI validation.

Both ZDI-23-1580 and ZDI-23-1581 also stem from improper URI validation, which can potentially lead to unauthorized information disclosure.

Mitigation:

ZDI recommends restricting interaction with Exchange applications as a precautionary measure. Additionally, customers are strongly advised to implement multi-factor authentication to prevent attackers from accessing Exchange accounts, particularly if credentials have been compromised.

References:

https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/

Leave a comment