Microsoft updates its mitigation advice for Exchange Server zero-day vulnerabilities
Since Microsoft acknowledged the existence of two actively exploited zero-day vulnerabilities in Exchange Server, security experts were quick to point out that the company was providing bad advice in response.
The URL blocking recommended by Microsoft was found to be sadly lacking, and hackers could easily bypass it. Now Microsoft has provided updated mitigation advice, as well as providing automated protection options.
See also:
- Microsoft releases Windows 11 Build 25217 with support for third party widgets
- Microsoft releases Windows HDR Calibration app to help configure your monitor in Windows 11
- Windows 11 2022 Update is causing Remote Desktop problems
- Microsoft makes Windows 11 2022 Update available to more people
Since its initial post on the Microsoft Security Response Center blog, Microsoft has updated its advice several times, but now the most recent update seems to be the most complete solution.
The new instructions for manual mitigation are now as follows:
- Open IIS Manager.
- Select Default Web Site.
- In the Feature View, click URL Rewrite.
- In the Actions pane on the right-hand side, click Add Rule(s)…
- Select Request Blocking and click OK.
- Add the string .*autodiscover\.json.*Powershell.*
- Select Regular Expression under Using.
- Select Abort Request under How to block and then click OK.
- Expand the rule and select the rule with the pattern: .*autodiscover\.json.*Powershell.* and click Edit under Conditions.
- Change the Condition input from {URL} to {UrlDecode:{REQUEST_URI}} and then click OK.
Microsoft also shares details of two other options:
Option 1: For customers who have the Exchange Emergency Mitigation Service (EEMS) enabled, Microsoft released the URL Rewrite mitigation for Exchange Server 2016 and Exchange Server 2019. The mitigation is enabled automatically and is updated to include the URL Rewrite rule improvements. Please see this blog post for more information on this service and how to check active mitigations.
Option 2: Microsoft created the EOMTv2 script for the URL Rewrite mitigation steps and updated it to include the URL Rewrite rule improvements. EOMTv2 script will auto-update on Internet connected machines and the updated version will show as 22.10.06.0840. The script should be
Image credit: rafapress / depositphotos