Over 57K Microsoft Exchange Servers Still Featuring ProxyNotShell Vulnerability

essidsolutions

There still are nearly 70,000 instances of Microsoft Exchange Server implementations vulnerable to one of the two ProxyNotShell vulnerabilities. According to the Shadowserver Foundation, these servers are yet to be patched to mitigate threats originating through CVE-2022-41082.

In late December 2022, the Shadowserver Foundation, a California-based nonprofit, discovered that as many as 70,000 Exchange Servers hadn’t received patches for ProxyNotShell, the same vulnerability that led to the Rackspace ransomware attack.

As of January 3, 2023, the number has decreased to 57,268, still quite significant given patches for the two security bugs (CVE-2022-41040Opens a new window and CVE-2022-41082Opens a new window ) were released on November Patch Tuesday.

Shadowserver Foundation’s data is based on server version details derived from the x_owa_version header.

 

Vulnerable Exchange Server Instances | Source: Shadowserver Foundation

See More: Microsoft Uncovers macOS Flaw That Let Hackers Bypass Gatekeeper Security

Discovered in late September 2022, the set of ProxyNotShell vulnerabilities allows elevation of privilege (EoP) through Server-Side Request Forgery (SSRF, CVE-2022-41040) and remote code execution (CVE-2022-41082).

Microsoft took its time to release the patches in November but provided a URL rewrite mitigation measure. So it is possible that administrators applied it to respective implementations. However, in December, Crowdstrike researchers unearthed OWASSRF, a way to bypass Microsoft’s mitigation, sending admins back to the drawing board.

We are reporting out Microsoft Exchange servers still likely vulnerable to CVE-2022-41082 #ProxyNotShellOpens a new window . Nearly 70K IPs found without MS patches applied (based on version info). Previously recommended mitigation techniques can be bypassed by attackers pic.twitter.com/dGA0LvEAbGOpens a new window

— Shadowserver (@Shadowserver) December 26, 2022Opens a new window

OWASSRF is already popular with threat actors, including the Play ransomware gang, which targeted the City of Antwerp and H-Hotels in December 2022.

ProxyNotShell impacts Exchange Server 2013, 2016 and 2019, so it goes without saying that admins need to be proactive and shore up defenses, especially if a patch is available.

ProxyNotShell is among several security issues discovered in Microsoft Exchange Servers in recent years. ProxyShell and Log4Shell were two of the most exploited flaws and ProxyLogon, which Microsoft fixed in March 2021, affected Exchange Servers as well.

Let us know if you enjoyed reading this news on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!

Image source: Shutterstock

MORE ON VULNERABILITIES