Microsoft Exchange On-Prem ZERO Day Threat
Microsoft has released patches for multiple on-premises Microsoft Exchange Server zero-day vulnerabilities that are being exploited by a nation-state affiliated group. The vulnerabilities exist in on-premises Exchange Servers 2010, 2013, 2016, and 2019.
Marcum would like to ensure you are aware of the situation and ask that you help drive immediate remediation steps. Direct your teams to start immediate action to assess your on-premises Exchange Server infrastructure and patch vulnerable servers, with the first priority being servers that are accessible from the Internet (e.g., servers publishing Outlook on the web/OWA and ECP).
To patch these vulnerabilities, move to the latest Exchange Cumulative Updates and then install the relevant security updates on each Exchange Server. You can use the Exchange Server Health Checker script, which can be downloaded from GitHub (use the latest release). Running this script will tell you if you are behind on your on-premises Exchange Server updates (note: the script does not support Exchange Server 2010).
We also recommend that your security team assess whether or not the vulnerabilities were being exploited by using the Indicators of Compromise.
We are committed to working with you through this issue. Your Marcum Microsoft account and support teams have been fully mobilized. Please reach out to anyone on your account team if you need help.
Information to assist you and your teams:
- March 2, 2021 Security Update Release
- CVE-2021-26412
- CVE-2021-26854
- CVE-2021-26855
- CVE-2021-26857
- CVE-2021-26858
- CVE-2021-27065
- CVE-2021-27078
If you have questions or need assistance, please contact us today at [email protected].