CyberArm partners with Neustar Security Services to offer best-in-class DNS, application, and network security CyberArm and Neustar Security Services are pleased to announce our entrance into a strategic partnership, combining CyberARM’s industry leading Managed Security & Consulting Services with Neustar Security’s cloud-delivered security services to enable businesses to thrive online. [...]
Implement an IIS Re-Write Rule and disable Unified Messaging (UM), Exchange Control Panel (ECP) VDir, and Offline Address Book (OAB) VDir Services
These mitigations have some known impact to functionality described below in detail.
These mitigations are effective against the attacks we have seen so far in the wild but are not guaranteed to be complete mitigations for all possible exploitation of these vulnerabilities.
This will not evict an adversary who has already compromised a server.
This should only be used as a temporary mitigation until Exchange servers can be fully patched.
IIS Re-Write rule – CVE-2021-26855
Description: This mitigation will filter https requests that contain malicious X-AnonResource-Backend and malformed X-BEResource cookies which were found to be used in the SSRF attacks in the wild. This will help with defense against the known patterns observed but not the SSRF as a whole.
Note: The IIS Rewrite rules will be removed after Exchange is upgraded and the mitigation will need to be reapplied if the security patch has not been installed.
Impact: No known impact to Exchange functionality, however, limited testing has been performed.
Description: Disabling ECP Virtual Directory will prevent CVE-2021-27065 from executing successfully as the API will no longer respond and return a 503 when calling the Exchange Control Panel (ECP).
Impact to Exchange: Exchange Control Panel will be offline and return a 503. All Exchange Administration can be done via Remote PowerShell while the Exchange Control Panel is disabled.
Description: Disabling OAB Application Pool will prevent CVE-2021-26858 from executing successfully as the API will no longer respond and return a 503 when calling OAB, which will mitigate the Arbitrary Write exploit that occurs with OAB. After stopping the WebApp Pool you will also need to set the OabProxy Server Component state to InActive.
Impact to Exchange: Calls to OAB will fail and return a 503 error. Downloads of the Offline Address Book by Outlook clients will fail which may result in stale address book results in some scenarios and configurations.
Detects whether the specified URL is vulnerable to the Exchange Server SSRF Vulnerability (CVE-2021-26855). This can be used to validate patch and mitigation state of exposed servers.
Note: This Alert was updated by our security researchers on March 4, 2021 to provide further guidance. CyberARM has observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation ...