Comments on: Two Zero-Day Vulnerabilities Hit Exchange Server https://practical365.com/exchange-day-zero-vulnerabilities/ Practical Office 365 News, Tips, and Tutorials Mon, 24 Jul 2023 13:27:56 +0000 hourly 1 https://wordpress.org/?v=6.6.1 By: <div class="apbct-real-user-wrapper"> <div class="apbct-real-user-author-name">Tony Redmond</div> <div class="apbct-real-user-badge" onmouseover=" let popup = document.getElementById('apbct_trp_comment_id_244041'); popup.style.display = 'inline-flex'; "> <div class="apbct-real-user-popup" id="apbct_trp_comment_id_244041"> <div class="apbct-real-user-title"> <p class="apbct-real-user-popup-header">The Real Person!</p> <p class="apbct-real-user-popup-text">Author <b>Tony Redmond</b> acts as a real person and passed all tests against spambots. Anti-Spam by CleanTalk.</p> </div> </div> </div> </div> https://practical365.com/exchange-day-zero-vulnerabilities/#comment-244041 Sat, 01 Oct 2022 15:54:11 +0000 https://practical365.com/?p=57301#comment-244041 In reply to Zack.

I’m focusing on this exploit because it’s the current one in the wild. You’re right that other exploits will appear. It’s the nature of the thing.

]]>
By: Zack https://practical365.com/exchange-day-zero-vulnerabilities/#comment-244040 Sat, 01 Oct 2022 15:46:50 +0000 https://practical365.com/?p=57301#comment-244040 In reply to Tony Redmond.

Focusing on this specific exploit needing authentication is rather short sighted. Last year’s critical Exchange vulnerability, ProxyShell, did not need authentication. And there will likely be future ones that won’t either.

We already researched and implemented the change and have had zero issues.

Basically, as long as you have all of your mailboxes on Exchange Online and autodiscover DNS record pointing to autodiscover.outlook.com, all you need to allow is port 25 and 443 (just in case of mailbox moves) from Exchange Online to your on-prem Exchange servers.

Now our on-prem Exchnage servers are much better protected from future zero days and unknown vulnerabilities and exploits out there on the internet.

]]>
By: Tony Redmond https://practical365.com/exchange-day-zero-vulnerabilities/#comment-244034 Sat, 01 Oct 2022 14:38:06 +0000 https://practical365.com/?p=57301#comment-244034 In reply to Zack.

I’d be cautious about this approach and certainly wouldn’t implement it without thorough testing. The point about these vulnerabilities is that they depend on an attacker gaining authenticated access to a server. At that point, your organization probably has other worries to deal with…

]]>
By: Zack https://practical365.com/exchange-day-zero-vulnerabilities/#comment-244014 Sat, 01 Oct 2022 05:23:14 +0000 https://practical365.com/?p=57301#comment-244014 If an organization is hybrid but have all of their mailboxes on Exchange online can they simply block internet traffic, except port 25 from Exchange Online IPs, to their on-premises Exchange servers in order to avoid vulnerabilities like these?

]]>