Original Article Text

Click to Toggle View

Microsoft Exchange gets ‘better’ patch to mitigate critical bug. The Exchange Team asked admins to deploy a new and "better" patch for a critical Microsoft Exchange Server vulnerability initially addressed in August. Tracked as CVE-2023-21709 and patched during August 2023 Patch Tuesday, the security flaw enables unauthenticated attackers to escalate privileges on unpatched Exchange servers in low-complexity attacks that don't require user interaction. "In a network-based attack, an attacker could brute force user account passwords to log in as that user. Microsoft encourages the use of strong passwords that are more difficult for an attacker to brute force," Microsoft explained. Even though Microsoft released security updates to fix the vulnerability, it also informed Exchange admins that they'd also have to remove the vulnerable Windows IIS Token Cache module manually or use this PowerShell script to ensure their servers are protected against attacks using CVE-2023-21709 exploits. As part of this month's Patch Tuesday, Microsoft has now released a new security update (CVE-2023-36434) that fully addresses the CVE-2023-21709 flaw and doesn't require any additional steps. "During the release of August 2023 SUs, we recommended to use a manual or scripted solution and disable the IIS Token Cache module as a way of addressing CVE-2023-21709," the Exchange Team said. "Today, Windows team has released the IIS fix for root cause of this vulnerability, in the form of fix for CVE-2023-36434. We recommend installing the IIS fix after which you can re-enable Token Cache module on your Exchange servers." Admins asked to re-enable vulnerable IIS module If you've already removed the Windows IIS Token Cache module to fully address the privilege escalation bug in August, you will now have to install today's security updates and re-enable the IIS module using this script or by running the following command from an elevated PowerShell prompt: Admins who are yet to patch the August CVE-2023-21709 security update are advised to install the Windows Server October 2023 security updates. "We are making updates to all related August 2023 documentation pages and scripts as well as Health Checker to reflect our new recommendation," Microsoft added. The October 2023 Patch Tuesday security updates patched 104 flaws, 12 rated critical and three tagged as zero-day vulnerabilities actively exploited in attacks. Microsoft refused to patch one of them, a Skype for Business Elevation of Privilege Vulnerability tracked as CVE-2023-41763 and disclosed by Dr. Florian Hauser in September 2022, until today, even though attackers can exploit it to gain access to systems on internal networks.

Daily Brief Summary

MALWARE // Microsoft Recommends Improved Patch for Exchange Server Bug

Microsoft's Exchange Team has encouraged administrators to deploy a new, more effective patch for a critical security flaw in its Exchange Server software.

The vulnerability, designated as CVE-2023-21709, was first addressed in August 2023. It allowed attackers to gain increased privileges on unpatched servers through brute force password attacks without any user interaction.

Although security updates were provided by Microsoft, admins were also required to manually remove the vulnerable Windows IIS Token Cache module or use a PowerShell script to fully protect their servers from CVE-2023-21709 exploits.

In the latest security update (CVE-2023-36434), a new solution has been provided that fully resolves the initial flaw, without requiring additional action. The company is now asking administrators to reinstall the Windows IIS Token Cache module on their servers.

Microsoft has indicated that updates are being made to all relevant documentation and scripts, and changes are being made to the Health Checker tool to reflect the new recommendations.

Microsoft also refused to issue a fix for an identified Skype for Business Elevation of Privilege Vulnerability until the recent Patch Tuesday, despite the fact that it was disclosed in September 2022 and has been actively exploited.