Threat groups are exploiting a vulnerability in the Exchange Control Panel (ECP) just weeks after Microsoft issued a patch, security researchers have discovered.
Details of the attacks were first brought to light by a report from U.K.-based Veloxity, which did not disclose the names of the hacker groups.
The vulnerability, also known as CVE-2020-0688, was addressed in Microsoft’s February Patch Tuesday update, and incidents were not immediately spotted in the wild. The flaw allows cybercriminals to send malicious serialized data via malformed requests to the ECP.
How the Exchange Bug Works
Applying the patch is particularly important in this case because the vulnerability could affect all Microsoft Exchange servers released over the past decade, given that they all use the same cryptographic keys to run the back end of their control panels, researchers said.
Once the servers fail to create a unique cryptographic key, hackers can run their malware code with SYSTEM privileges since the control panel’s data is unserialized. This gives third parties full control over the server.
Researchers suggested hackers began exploiting the vulnerability following the release of technical details about how it worked by the Zero Day Initiative. This led to several proofs-of-concept that were published on the open-source code repository Github, which might have become the catalysts for cybercriminals scanning vulnerable Exchange servers where the patch hasn’t been applied.
While the vulnerability may prove attractive to ransomware gangs or those developing advanced persistent threats (APTs), researchers noted they would need the credentials for at least one email account on a targeted server. This could limit the ability of script kiddies or other low-level hackers to launch an attack.
The U.S. Department of Defense (DOD) confirmed reports of attacks leveraging the Exchange Control Panel vulnerability to ZDNet.
Always Apply Patches in a Timely Manner
Given how much corporate information runs through email servers, these reports underscore the need to apply Microsoft’s Feb. 11 patch for CXE-2020-0668 immediately.
Companies should also think about whether they can effectively calculate factors such as their mean time to patch. As these attacks prove, hacker groups don’t waste any time in going after whatever opportunities a vulnerability may present.
Writer & Editor
Shane Schick is a contributor for SecurityIntelligence.