March 10, 2020 By Shane Schick 2 min read

Threat groups are exploiting a vulnerability in the Exchange Control Panel (ECP) just weeks after Microsoft issued a patch, security researchers have discovered.

Details of the attacks were first brought to light by a report from U.K.-based Veloxity, which did not disclose the names of the hacker groups.

The vulnerability, also known as CVE-2020-0688, was addressed in Microsoft’s February Patch Tuesday update, and incidents were not immediately spotted in the wild. The flaw allows cybercriminals to send malicious serialized data via malformed requests to the ECP.

How the Exchange Bug Works

Applying the patch is particularly important in this case because the vulnerability could affect all Microsoft Exchange servers released over the past decade, given that they all use the same cryptographic keys to run the back end of their control panels, researchers said.

Once the servers fail to create a unique cryptographic key, hackers can run their malware code with SYSTEM privileges since the control panel’s data is unserialized. This gives third parties full control over the server.

Researchers suggested hackers began exploiting the vulnerability following the release of technical details about how it worked by the Zero Day Initiative. This led to several proofs-of-concept that were published on the open-source code repository Github, which might have become the catalysts for cybercriminals scanning vulnerable Exchange servers where the patch hasn’t been applied.

While the vulnerability may prove attractive to ransomware gangs or those developing advanced persistent threats (APTs), researchers noted they would need the credentials for at least one email account on a targeted server. This could limit the ability of script kiddies or other low-level hackers to launch an attack.

The U.S. Department of Defense (DOD) confirmed reports of attacks leveraging the Exchange Control Panel vulnerability to ZDNet.

Always Apply Patches in a Timely Manner

Given how much corporate information runs through email servers, these reports underscore the need to apply Microsoft’s Feb. 11 patch for CXE-2020-0668 immediately.

Companies should also think about whether they can effectively calculate factors such as their mean time to patch. As these attacks prove, hacker groups don’t waste any time in going after whatever opportunities a vulnerability may present.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today