Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

8,500+ Exchange Servers Vulnerable To Privilege escalation 0-Day

admin by admin
Feb 20, 2024
in News
A A
0

A critical vulnerability in Microsoft Exchange Server, identified as CVE-2024-21410, has been reported to be actively exploited by threat actors. 

This zero-day flaw allows remote unauthenticated attackers to perform NTLM relay attacks and escalate their privileges on the system. As of the latest reports, over 28,500 Exchange servers remain vulnerable to this security issue.

Privilege Escalation 0-day Flaw

The CVE-2024-21410 vulnerability enables attackers to force a network device to authenticate against an NTLM relay server under their control. 

This allows them to impersonate the targeted devices and elevate privileges.

Microsoft discovered the flaw internally, and it has been addressed in the Exchange Server 2019 Cumulative Update 14 (CU14), which enables NTLM credentials Relay Protections, also known as Extended Protection for Authentication (EPA).

As per the latest Shadow Server reports, it has been found that roughly 97,000 servers that are vulnerable have been exposed over the Internet.

Over the weekend we started reporting Microsoft Exchange versions vulnerable to CVE-2024-21410. On 2024-02-17 around 97K vulnerable or possibly vulnerable where the latter means a vulnerable version but may have mitigation applied. Microsoft guidance: https://t.co/fCGxmZvYCS pic.twitter.com/6c9YwEe7HF

— Shadowserver (@Shadowserver) February 19, 2024

Mitigation Strategies

Microsoft has provided mitigation strategies to protect against this vulnerability.

The key mitigation involves enabling Extended Protection (EP) on Exchange servers, which is designed to strengthen Windows Server authentication functionality by mitigating relay and man-in-the-middle (MitM) attacks. 

EP will be automatically enabled by default on all Exchange servers after installing the 2024 H1 Cumulative Update (CU14).

For previous versions of Exchange Server, such as Exchange Server 2016, administrators can activate EP using the ExchangeExtendedProtectionManagement PowerShell script provided by Microsoft.

It is crucial to promptly apply these mitigations to protect against attacks targeting unpatched devices.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.