- A safety vulnerability in Microsoft Exchange servers remain largely unmatched
- A solution was issued four years ago but some users obviously did not
- This error may have helped the hacking group Salt Typhon
Critical safety vulnerability seems to be a regular occurrence in technology reporting, with countless patches and updates to keep track of – but this Microsoft Exchange Server error can be one to take very seriously.
Most of us will be familiar with the big incident where 9 American telecommunications commercials were broken into what seemed to be a Chinese state sponsored cyber-spionage campaign. The attack, which is attributed to hacking by the Salphoon group, is said to have at least partially utilized a known critical security error in Microsoft Exchange Server.
The vulnerability, called proxylogone, was revealed by Microsoft in 2021, and a patch has been available for 4 years. Despite this, Cyber-Risk Management Company Tenable has calculated in nearly 30,000 cases affected by proxylogone, 91% remain unmatched.
Cisa -Guide
The US Cyber Security and Infrastructure Security Agency (CISA) released previous in-depth guidance on strengthening visibility and curing systems and devices in response to the infringement and has emphasized end-to-end encryption to safe communication.
ProGylogone is one of five commonly utilized vulnerabilities used by salt typhoon. Others include Ivanti Connect Secure Command injection and approval of bypass vulnerability as well as a Sophos Firewall Code injection vulnerability.
In light of this, the recommendation and advice to all security teams out there is always to patch where available and keep up to date as possible on any software for potential vulnerabilities or corrections.
“In light of the vulnerabilities exposed by Salt Typhoon, we need to intervene to secure our network,” said the chairman of the federal communication commission Jessica Rosenworcel.
“Our existing rules are not modern. It’s time for us to update them to reflect current threats, so we have a battle chance to make sure state -sponsored cyberattacks are not successful. The time to take this action is now. We don’t have that luxury to wait. “