IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

A critical flaw in 350,000 Microsoft Exchange remains unpatched

A patch has been available for months, but its adoption has been slow

Over 350,000 of all Microsoft Exchange servers have not been patched against the CVE-2020-0688 post-auth remote code execution vulnerability impacting all supported Microsoft Exchange Server versions.

A patch arrived in Microsoft's February 11 patch, but few organizations have actually moved forward with applying it to their servers.

Microsoft has encouraged admins to apply the patch as soon possible, tagging it with an "Exploitation More Likely" exploitability index assessment, hinting that the vulnerability may be an attractive target for attackers. The company also said that it anticipates future attacks on the remote code execution vulnerability, making the recently released patch even more important.

Attacks on vulnerable Exchange mail servers began in February. These attacks followed the release of a technical report that detailed how the bug worked. This report was then followed by multiple proof-of-concept exploits, along with a Metasploit module. 

Now, nearly two months later, Rapid7 researchers used its Project Sonar to scan the internet and identified at least 82.5% of the 433,464 Exchange servers in the scan were vulnerable to CVE-2020-0688.

To make matters worse, many of the servers tagged by Rapid7 as being safe against attacks may also be vulnerable because many updates to the server did not include an update to the build numbers.

"There are two important efforts that Exchange Administrators and infosec teams need to undertake: verifying deployment of the update and checking for signs of compromise," Rapid7 Labs senior manager Tom Sellers explained.

Related Resource

Five essentials of a secure modern workplace

The CIO's guide to unleashing productivity whilst minimising risk

Download now

Compromised user accounts and accounts that have been used in attacks against Exchange servers can be discovered by checking Windows Event and IIS logs for portions of encoded payloads, including either the "Invalid viewstate" text or the __VIEWSTATE and __VIEWSTATEGENERATOR string for requests to a path under /ecp.

Microsoft says that because there are no mitigating factors for this vulnerability, patching your servers before attackers locate them and compromise your entire network is of the utmost importance.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Rugged servers market to hit $945 million by 2032
Hardware

Rugged servers market to hit $945 million by 2032

30 May 2022

Most Popular

Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022
Macmillan Publishers hit by apparent cyber attack as systems are forced offline
Security

Macmillan Publishers hit by apparent cyber attack as systems are forced offline

30 Jun 2022
FCC commissioner urges Apple and Google to remove TikTok from app stores
data protection

FCC commissioner urges Apple and Google to remove TikTok from app stores

29 Jun 2022