Categories
Shared Links And Posts - trumpinvestigations.net

PoC exploit code for ProxyNotShell Microsoft Exchange bugs released online

Advertisements | Advertising at The News And Times - advertising-newsandtimes.com | WE CONNECT!
Spread the news

Listen to this article

Microsoft-Exchange.jpg?fit=400%2C300&ssl

Proof-of-concept exploit code for two actively exploited Microsoft Exchange ProxyNotShell flaws released online.

Proof-of-concept exploit code has been released online for two actively exploited vulnerabilities in Microsoft Exchange, known as ProxyNotShell.

The two flaws are:

  • CVE-2022-41040 – Microsoft Exchange Server Elevation of Privilege Vulnerability
  • CVE-2022-41082 – Microsoft Exchange Server Remote Code Execution Vulnerability

they impact Exchange Server 2013, 2016, and 2019, an authenticated attacker can trigger them to elevate privileges to run PowerShell in the context of the system and gain arbitrary or remote code execution on vulnerable servers.

Cybersecurity firm GreyNoise confirmed that threat actors are attempting to exploit the flaws since late September, Bleeping Computer reported.

Microsoft addressed both vulnerabilities with the release of Patch Tuesday updates for November 2022 security updates.

This week the popular researcher Will Dormann confirmed that PoC exploit code released by the security researcher Janggggg, which was exploited by threat actors in the wild, works against Exchange Server 2016 and 2019, and even against 2013 with some modifications. The expert demonstrated how to exploit the bug to execute calc.exe as SYSTEM.

Can confirm.
This is a working exploit for #ProxyNotShell CVE-2022-41040 / CVE-2022-41082
Here we have an Exchange 2019 box that’s only up to date with what was available in October, and we have successful execution of calc.exe as SYSTEM.
🎉 https://t.co/PQfen11x7n pic.twitter.com/BlCJSJMcJM

— Will Dormann (@wdormann) November 17, 2022

Hmm, I’m not sure what I did wrong the first time around, but Exchange 2016 seems to work just fine with this PoC as well. It’s perhaps just Exchange 2013 that requires a tweak. pic.twitter.com/nYJ0dC9zzL

— Will Dormann (@wdormann) November 18, 2022

Microsoft urges its customers to install the updates immediately to be protected against attacks exploring these flaws. The IT giant confirmed that they are aware of active exploits of related vulnerabilities that have been used in limited targeted attacks.

“Because we are aware of active exploits of related vulnerabilities (limited targeted attacks), our recommendation is to install these updates immediately to be protected against these attacks.” states Microsoft.

“Mitigations are not actual code fixes of specific vulnerabilities. Please install the November 2022 (or later) SU on your Exchange servers to address CVE-2022-41040 and CVE-2022-41082.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ProxyNotShell)

The post PoC exploit code for ProxyNotShell Microsoft Exchange bugs released online appeared first on Security Affairs.


Spread the news
Advertisements | Advertising at The News And Times - advertising-newsandtimes.com | WE CONNECT!
WP Radio
WP Radio
OFFLINE LIVE