Original Article Text

Click to Toggle View

Germany warns of 17K vulnerable Microsoft Exchange servers exposed online. The German national cybersecurity authority warned on Tuesday that it found at least 17,000 Microsoft Exchange servers in Germany exposed online and vulnerable to one or more critical security vulnerabilities. According to the German Federal Office for Information Security (BSI), around 45,000 Microsoft Exchange servers in Germany have Outlook Web Access (OWA) enabled and are accessible from the Internet. Approximately 12% of these servers still use outdated versions of Exchange (2010 or 2013), which have not received security updates since October 2020 and April 2023, respectively. For the Exchange 2016 or 2019 servers exposed online, roughly 28% have not been patched for at least four months and are vulnerable to at least one critical security flaw exploitable in remote code execution attacks. "Overall, at least 37% of Exchange servers in Germany (and in many cases also the networks behind them) are severely vulnerable. This corresponds to approx. 17,000 systems. In particular, many schools and colleges, clinics, doctor's offices, nursing services and other medical institutions, lawyers and tax consultants, local governments, and medium-sized companies are affected," the BSI warned [PDF]. "As early as 2021, the BSI warned several times against the active exploitation of critical vulnerabilities in Microsoft Exchange and temporarily called the IT threat situation 'red.' Nevertheless, the situation has not improved since then, as many Exchange server operators continue to act very carelessly and do not release available security updates in a timely manner." ​The BSI urged the admins of these unpatched servers to always use current Exchange versions, install all available security updates, and configure instances exposed online securely. To do that, they must regularly check whether their systems are on the current Microsoft Exchange patch level and ensure that the March 2024 monthly security updates are installed as soon as possible: The BSI also recommends restricting access to web-based Exchange server services such as Outlook Web Access to trusted source IP addresses or securing them via a VPN rather than making them accessible from the Internet. Furthermore, to protect against active exploitation of the CVE-2024-21410 critical privilege escalation vulnerability disclosed by Microsoft last month, they must enable Extended Protection on all Exchange servers using this dedicated PowerShell script. In February, threat monitoring service Shadowserver warned that 28,500 Microsoft Exchange servers were vulnerable to ongoing CVE-2024-21410 attacks. Shadowserver also confirmed BSI's findings, saying that up to 97,000 servers, including over 22,000 from Germany, could be potentially vulnerable if Extended Protection wasn't enabled. Microsoft is now automatically toggling on Extended Protection on Exchange servers after installing the February 2024 H1 Cumulative Update (CU14). The company also urged Exchange admins one year ago to keep their on-premises servers up-to-date, so they're always ready to deploy emergency security patches.

Daily Brief Summary

CYBERCRIME // Thousands of German Microsoft Exchange Servers at Risk of Exploitation

The German Federal Office for Information Security (BSI) warns of 17,000 vulnerable Microsoft Exchange servers online.

Approximately 37% of all German Exchange servers are severely vulnerable due to outdated versions or unpatched security flaws.

Critical vulnerabilities could lead to remote code execution attacks, especially on servers running outdated Exchange versions from 2010 and 2013.

Vulnerabilities persist despite previous warnings and the declaration of an 'IT threat situation red' by the BSI in 2021, due to the negligence of server operators in updating their systems.

BSI advises admins to use current Exchange versions, apply all security updates, and configure web-based services securely, potentially limiting access or using VPN.

Microsoft has responded by enabling Extended Protection by default on updated Exchange servers and continues to stress the importance of keeping on-premises servers up-to-date.