Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Exploits

Microsoft Exchange Faces Critical Zero-Day Vulnerabilities: Trend Micro’s ZDI Discloses Four Flaws

Kyle by Kyle
November 4, 2023
in Exploits
Reading Time: 2 mins read
0
Microsoft Exchange Exploits discovered by Iotr BAzydlo
32
SHARES
451
VIEWS
Share on FacebookShare on Twitter

Trend Micro’s Zero Day Initiative (ZDI) has unveiled four zero-day vulnerabilities in Microsoft Exchange that pose serious security risks. These vulnerabilities, reported to Microsoft on September 7th and 8th, 2023, are yet to be patched by the IT giant, despite acknowledging the issues. ZDI has opted for public disclosure, in line with its responsible disclosure policy.

You might also like

Over 30,000 Outdated Microsoft Exchange Servers Exposed to Cyber Threats

Critical Vulnerabilities in IoT Routers Threaten Industries, Warns Forescout Analysts

Critical Security Flaw in Citrix Exposes Sensitive Data, Exploited by Threat Actors, Reveals Mandiant Report

Here is the list of vulnerabilities exposed by ZDI:

  1. ZDI-23-1578 – ChainedSerializationBinder Deserialization of Untrusted Data Remote Code Execution Vulnerability in Microsoft Exchange: This flaw enables remote attackers to execute arbitrary code on vulnerable Microsoft Exchange installations. Authentication is required for exploitation. The issue stems from inadequate validation of user-supplied data, potentially leading to untrusted data deserialization. An attacker can exploit this to execute code in the SYSTEM context.
  2. ZDI-23-1579 – DownloadDataFromUri Server-Side Request Forgery Information Disclosure Vulnerability in Microsoft Exchange: This vulnerability allows remote attackers to disclose sensitive information in affected installations of Microsoft Exchange. Authentication is needed for exploitation. The problem lies in the DownloadDataFromUri method, where improper URI validation leads to resource access. This can be leveraged to reveal information within the Exchange server.
  3. ZDI-23-1580 – DownloadDataFromOfficeMarketPlace Server-Side Request Forgery Information Disclosure Vulnerability in Microsoft Exchange: This flaw permits remote attackers to expose sensitive data on vulnerable Microsoft Exchange installations. Authentication is required for exploitation. The specific issue resides in the DownloadDataFromOfficeMarketPlace method, where inadequate URI validation facilitates resource access. An attacker can exploit this to disclose information within the Exchange server.
  4. ZDI-23-1581 – CreateAttachmentFromUri Server-Side Request Forgery Information Disclosure Vulnerability in Microsoft Exchange: This vulnerability enables remote attackers to reveal sensitive information in vulnerable Exchange installations. Authentication is necessary for exploitation. The flaw is associated with the CreateAttachmentFromUri method, where insufficient URI validation allows access to resources. An attacker can use this to uncover information within the Exchange server.

These vulnerabilities were discovered by Piotr Bazydlo of Trend Micro Zero Day Initiative, emphasizing the critical need for prompt mitigation.

Tags: Microsoft Exchange
Kyle

Kyle

Co-owner, writer, and editor at ZeroSecurity. Security, Blockchain, and SEO enthusiast. "Formal education will make you a living; self-education will make you a fortune."

Recommended For You

Security Concerns Rise as 30,000+ Outdated Microsoft Exchange Servers Remain Vulnerable to Cyber Threats, ShadowServer Foundation Reports.

Over 30,000 Outdated Microsoft Exchange Servers Exposed to Cyber Threats

December 2, 2023
Unveiling imminent threats: Forescout's analysts expose critical vulnerabilities in IoT routers, risking industries and urging immediate action.

Critical Vulnerabilities in IoT Routers Threaten Industries, Warns Forescout Analysts

November 14, 2023

Critical Security Flaw in Citrix Exposes Sensitive Data, Exploited by Threat Actors, Reveals Mandiant Report

November 2, 2023

Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes

October 30, 2023

HackerOne Surpasses $300 Million in Rewards for Ethical Hackers

October 29, 2023

Researchers earned $1M+ for 58 zero-day exploits at Pwn2Own Toronto 2023

October 28, 2023
Next Post
North Korea-Linked Lazarus Group Unleashes New KandyKorn macOS Malware in Targeted Assaults on Blockchain Engineers

North Korea-Linked Lazarus Group Unleashes New KandyKorn macOS Malware in Targeted Assaults on Blockchain Engineers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Iranian hacking group 'Cyber Av3ngers' targets Pennsylvania water authority in a cyberattack, highlighting vulnerabilities in critical infrastructure cybersecurity. Investigations underway by U.S. authorities.

Iranian Hacking Group Targets Pennsylvania Water Authority in Attack on Critical Infrastructure

November 28, 2023
Crisis at Ardent Health: Ransomware attack disrupts operations, forcing patient diversions. The Tennessee-based provider initiates cybersecurity measures.

Cybersecurity Crisis Hits Ardent Health Services

November 27, 2023
State-owned China Energy Engineering Corp (CEEC) hit by Rhysida ransomware; global alert issued. Insights into tactics and impact on #StopRansomware effort

China Energy Giant, CEEC, Falls Victim to Rhysida Ransomware Attack

November 26, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact us
  • Press
  • Writers
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Contact Us
    • Press
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.