Security Market Segment LS
Wednesday, 14 April 2021 05:55

Four more remotely exploitable bugs found in Microsoft Exchange Server Featured

Four more remotely exploitable bugs found in Microsoft Exchange Server Image by Ron van den Berg from Pixabay

Microsoft has issued patches for four remotely-exploitable vulnerabilities in its Exchange Server product, a little more than a month after the company warned of four zero-day exploits being used to attack the application.

Two of the vulnerabilities were reported by the NSA, with the agency saying in a tweet that it "urges applying critical Microsoft patches released today, as exploitation of these #vulnerabilities could allow persistent access and control of enterprise networks".

All four of these vulnerabilities do not need elevated privileges to exploit and two — CVE-2021-28480 and CVE-2021- 28481 — are believed to be wormable between Exchange Servers, according to a write-up by Trend Micro's Zero Day Initiative.

Apart from these critical vulnerabilities, Kaspersky researchers Boris Larin, Costin Raiu and Brian Bartholomew reported they had found a zero-day exploit in the Desktop Window Manager which was also patched in the April updates, part of Microsoft's monthly patch Tuesday when a truckload of bugs are usually disclosed.

"We believe this exploit is used in the wild, potentially by several threat actors. It is an escalation of privilege exploit that is likely used together with other browser exploits to escape sandboxes or get system privileges for further access," the three researchers said.

"Unfortunately, we weren’t able to capture a full chain, so we don’t know if the exploit is used with another browser zero-day, or coupled with known, patched vulnerabilities."

In all, Microsoft documented 114 vulnerabilities which it patched, 19 of which were classed as critical, 88 as important, and one as moderate.

"This is the largest number of CVEs addressed in a month by Microsoft this year, and it is slightly higher than April of last year," ZDI's Dustin Childs said in a blog post.

"...five of these bugs came through the ZDI program. None of the bugs being addressed this month were disclosed at the recent Pwn2Own contest."

Childs said six other bugs affected the Edge browser, which is based on Google's open-source Chromium browser, and were ingested from a recent Chromium update. "According to Microsoft, one bug is currently being exploited while four others are publicly known at the time of release," he added.

Commenting on the vulnerabilities, Satnam Narang, staff research engineer with security shop Tenable, said the four vulnerabilities had been rated 'Exploitation More Likely' using Microsoft's Exploitability Index.

"Two of the four vulnerabilities (CVE-2021-28480, CVE-2021-28481) are pre-authentication, meaning an attacker does not need to authenticate to the vulnerable Exchange server to exploit the flaw," he explained.

Microsoft also patched CVE-2021-28310, a Win32k Elevation of Privilege vulnerability that was exploited in the wild as a zero-day.

Narang said exploitation of this vulnerability would give an attacker elevated privileges on a vulnerable system. "This would allow an attacker to execute arbitrary code, create new accounts with full privileges, access and/or delete data and install programs," he warned.

"Elevation of Privilege vulnerabilities are leveraged by attackers post-compromise, once they've managed to gain access to a system in order to execute code on their target systems with elevated privileges."

Read 1756 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News