MS.Exchange.MailboxExportRequest.Arbitrary.File.Write
Description
This indicates an attack attempt to exploit an Arbitrary File Write Vulnerability in Microsoft Exchange Server.
The vulnerability is due to improper handling of MailboxExportRequest PowerShell commands. An authenticated, remote attacker can exploit this vulnerability by sending a crafted MailboxExportRequest command to the target server. Successful exploitation could result in the writing of an arbitrary file which may be used to facilitate the execution of arbitrary code.
Outbreak Alert
The Hive ransomware gang has received up to $100+ million in ransom payments from more than 1,300 victims according to a joint advisory released by the FBI, the U.S. Cybersecurity and Infrastructure Security Agency, and the Department of Health and Human Services.
Affected Products
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 19
Microsoft Exchange Server 2016 Cumulative Update 20
Microsoft Exchange Server 2019 Cumulative Update 8
Microsoft Exchange Server 2019 Cumulative Update 9
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2022-09-01 | 22.385 | Sig Added |
2021-09-23 | 18.164 | Default_action:pass:drop |
2021-09-15 | 18.158 |