Technology

Run an Exchange Server? Hurry Up and Patch This Vulnerability

A high-profile vulnerability recently disclosed in Microsoft Exchange is being exploited by state-level actors, warn security experts. Fortunately, there is a patch available.

Many associations rely on Microsoft Exchange as a fundamental part of the way they work, and if they do, they’re going to want to batten down the hatches.

This week, the National Security Agency spoke out on Twitter about a vulnerability that affects all versions of Microsoft Exchange Server between 2010 and 2019. The security issue allows for remote code to be executed on the widely used servers when users fail to properly create cryptographic install keys for the server during installation. Many users don’t, meaning that numerous Exchange servers are on the internet that are vulnerable to this oversight.

The issue was disclosed by Microsoft back in February, but is drawing attention now due to its use by state-level forces, according to ZDNet.

As BetaNews notes, IT security firm Volexity has warned that many companies had already seen their servers compromised, and while a patch has been released, many companies had not taken steps to apply the patch.

“Volexity has observed multiple [advanced persistent threat] actors exploiting or attempting to exploit on-premise Exchange servers,” the firm said on its blog. “In some cases the attackers appear to have been waiting for an opportunity to strike with credentials that had otherwise been of no use.”

Beyond patching, solutions to the problem recommended by the security firm include the use of two-factor authentication, which can slow down the attack, and putting access control list restrictions on the Exchange Control Panel virtual directories, which can prevent attackers from getting in.

The long-standing use and historic market position has made Exchange Server particularly vulnerable to attacks of this nature over the years, and this is not the only one. Microsoft has recently urged Exchange users to disable old protocols that had gained vulnerabilities over time, noting that the vulnerabilities had been exploited by ransomware or high-profile malware attacks such as WannaCry.

(doyata/iStock/Getty Images Plus)

Ernie Smith

By Ernie Smith

Ernie Smith is a former senior editor for Associations Now. MORE

Got an article tip for us? Contact us and let us know!


Comments