{"id":13575,"date":"2021-03-01T15:04:00","date_gmt":"2021-03-01T15:04:00","guid":{"rendered":"https:\/\/www.dfi.ch\/microsoft-exchange-security-vulnerabilities\/"},"modified":"2022-09-01T11:26:50","modified_gmt":"2022-09-01T11:26:50","slug":"microsoft-exchange-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.cheops-technology.ch\/en\/microsoft-exchange-security-vulnerabilities\/","title":{"rendered":"Microsoft Exchange security vulnerabilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13575\" class=\"elementor elementor-13575 elementor-12223\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d3a0ba2 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d3a0ba2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60ff4de ot-flex-column-vertical\" data-id=\"60ff4de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a20f67 elementor-widget elementor-widget-iheading\" data-id=\"8a20f67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h4 class=\"main-heading\">DFi Service vous propose son retour d\u2019exp\u00e9rience sur le plan d\u2019action adopt\u00e9 pour ses clients, ses conseils et ses recommandations.<\/h4>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dd6bd4 elementor-widget elementor-widget-spacer\" data-id=\"4dd6bd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dbfb84f ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dbfb84f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce7b902 ot-flex-column-vertical\" data-id=\"ce7b902\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-871fc82 elementor-widget elementor-widget-spacer\" data-id=\"871fc82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5053a2e elementor-widget elementor-widget-text-editor\" data-id=\"5053a2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"color: #777777; text-align: left;\">Over the last few days, numerous press releases have reported massive attacks on email servers worldwide. DFi Service offers you a review of the situation.<\/p><p style=\"color: #777777; text-align: left;\">On 02\/03\/2021, Microsoft made public multiple vulnerabilities targeting Microsoft Exchange mail servers. Following this announcement, security patches were made available by Microsoft. These updates fix a chain of pre-authentication remote code execution (RCE) vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065) that allow attackers to compromise the servers.<\/p><p style=\"color: #777777; text-align: left;\">Despite the measures undertaken, analyses by DFi and the various security organisations (CERT \/ CSIRT), have identified that these vulnerabilities were already being actively exploited (0days) well before the publication of patches by Microsoft.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad9c9bc elementor-widget elementor-widget-spacer\" data-id=\"ad9c9bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2e0c3a elementor-widget elementor-widget-image\" data-id=\"e2e0c3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"706\" height=\"331\" src=\"https:\/\/www.cheops-technology.ch\/wp-content\/uploads\/2022\/07\/1-1.png\" class=\"attachment-large size-large wp-image-12235\" alt=\"\" srcset=\"https:\/\/www.cheops-technology.ch\/wp-content\/uploads\/2022\/07\/1-1.png 706w, https:\/\/www.cheops-technology.ch\/wp-content\/uploads\/2022\/07\/1-1-300x141.png 300w\" sizes=\"(max-width: 706px) 100vw, 706px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d5bda elementor-widget elementor-widget-spacer\" data-id=\"e2d5bda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90390f3 elementor-widget elementor-widget-text-editor\" data-id=\"90390f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Figure1. Chronology of events<\/strong><\/p><p>In response to these risks, DFi Service decided to deploy a massive incident response plan for all managed customers, to cover the following aspects<\/p><ul><li style=\"text-align: center;\">Identification of impacted servers<\/li><li style=\"text-align: center;\"><span style=\"color: var( --e-global-color-text ); font-weight: var( --e-global-typography-text-font-weight );\">Patching of vulnerable servers<\/span><\/li><li style=\"text-align: center;\"><span style=\"color: var( --e-global-color-text ); font-weight: var( --e-global-typography-text-font-weight );\">Identification of signs of compromise<\/span><\/li><li style=\"text-align: center;\"><span style=\"color: var( --e-global-color-text ); font-weight: var( --e-global-typography-text-font-weight );\">Cleaning up malicious files<\/span><\/li><\/ul><p> <\/p><p>These actions could be completed by DFi Service with more advanced analyses in order to identify a potential post-exploitation risk (forensic analyses) or by integrating advanced detection solutions (Security Operations Center, EDR, etc.)<\/p><p>In addition to the incident response plan, DFi Service has contacted all of its managed customers affected in order to propose recommendations adapted to the context, environment and architecture of the customer.<\/p><p> <\/p><p><strong>Recommendations and security principles<\/strong> <strong>:<\/strong><\/p><p>To guarantee better protection of Exchange mail servers, DFi Service recommends applying the following best practices:<\/p><ul><li style=\"text-align: center;\">Adopt the principle of secure architecture by design to avoid making the Exchange server directly accessible from the Internet:<\/li><li style=\"text-align: center;\">Set up a web application firewall (WAF) to filter and secure incoming web flows<\/li><li style=\"text-align: center;\">Implementation of an SMTP bastion to secure incoming and outgoing SMTP flows<\/li><li style=\"text-align: center;\">Set up a WEB bastion or proxy to filter outgoing web flows from the mail server<\/li><li style=\"text-align: center;\">Maintain and deploy patches on the entire information system<\/li><li style=\"text-align: center;\">Define an incident response policy, enabling the actions to be taken when major security incidents occur.<\/li><li style=\"text-align: center;\">Integrate advanced detection solutions:<\/li><li style=\"text-align: center;\">SIEM\/SOC service to monitor the entire information system and provide real-time detection<\/li><li style=\"text-align: center;\">EDR Antivirus to increase security on workstations<\/li><li style=\"text-align: center;\">Define an appropriate backup and recovery strategy<\/li><li style=\"text-align: center;\">Define an incident response strategy to undertake the right actions<\/li><\/ul><p>For all these principles, DFi Service can offer you customised support.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DFi Service vous propose son retour d\u2019exp\u00e9rience sur le plan d\u2019action adopt\u00e9 pour ses clients, ses conseils et ses recommandations. Over the last few days, numerous press releases have reported massive attacks on email servers worldwide. DFi Service offers you a review of the situation. On 02\/03\/2021, Microsoft made public multiple vulnerabilities targeting Microsoft Exchange [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12231,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[90,1],"tags":[],"class_list":["post-13575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-en","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/comments?post=13575"}],"version-history":[{"count":1,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13575\/revisions"}],"predecessor-version":[{"id":13576,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/posts\/13575\/revisions\/13576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/media\/12231"}],"wp:attachment":[{"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/media?parent=13575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/categories?post=13575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cheops-technology.ch\/en\/wp-json\/wp\/v2\/tags?post=13575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}