Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
THREAT INTELLIGENCE:
Two zero-day vulnerabilities, CVE-2022-41043 (Microsoft Office Information Disclosure Vulnerability) which has been reported by Microsoft as currently being exploited in the wild and CVE-2022-41033 (Windows COM+ Event System Service Elevation of Privilege Vulnerability) which has not been reported by Microsoft as currently being exploited in the wild, have both been fixed in the latest patch.
Meanwhile, Microsoft has not released security updates for two actively exploited zero-day vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082, also known as ProxyNotShell. There are multiple reports detailing the active exploitation of these vulnerabilities, which includes security researchers tracking active campaigns leveraging remote code execution vulnerabilities. GTSC, the Vietnamese cybersecurity company that discovered the two vulnerabilities, reported the vulnerabilities were exploited in early August 2022. According to the GTSC report, cyber threat actors (CTAs) are chaining the vulnerabilities to create backdoors for persistence or to move laterally in the victim network. For example, CTAs exploiting these vulnerabilities deployed the China Chopper webshell for persistent remote access. Some security researchers are referring to the exploit chain as “ProxyNotShell.”
Researchers have warned that Microsoft's mitigation can be bypassed. Security researcher Jang documented how a potential attacker could bypass the proposed mitigation with little effort, and researchers at GTSC confirmed the bypass. However, please note Microsoft has released updated mitigations as of 10/7 and the aforementioned bypass was reported prior. Researchers have also warned that users with a hybrid setup combining on-premises and cloud deployment of exchange are also vulnerable to these zero days.
A BleepingComputer report noted that a scammer set up a GitHub repository and is “impersonating security researchers to sell fake proof-of-concept ProxyNotShell exploits” for Exchange CVE-2022-41040 and CVE-2022-41082 vulnerabilities. CISA is aware of the vulnerabilities and encourages users and administrators to review information from Microsoft and “apply the necessary mitigations until patches are made available.”
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.
A full list of all vulnerabilities can be found at the link below:
https://learn.cisecurity.org/e/799323/update-guide/3xxmgn/513835912?h=NbOxRSpILBtGyvsB89xuvD6tXVvGgNPP1TpvVQ1yAjc
Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
RECOMMENDATIONS:
We recommend the following actions be taken:
1. For CVE-2022-41040 and CVE-2022-41082: Remove or deny access to unnecessary and potentially vulnerable software to prevent abuse by adversaries (M1042: Disable or Remove Feature or Program)
2. Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing. (M1051: Update Software)
3. Apply the Principle of Least Privilege to all systems and services, and run all software as a non-privileged user (one without administrative rights) to diminish the effects of a successful attack. (M1026: Privileged Account Management)
4. Remind all users not to visit untrusted websites or follow links/open files provided by unknown or untrusted sources. (M1017: User Training)
5. Use capabilities to prevent suspicious behavior patterns from occurring on endpoint systems. This could include suspicious process, file, API call, etc. behavior. (M1040 : Behavior Prevention on Endpoint)
REFERENCES:
Microsoft:
• https://msrc.microsoft.com/update-guide/
• https://msrc.microsoft.com/update-guide/releaseNote/2022-Oct
• https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/ (CVE-2022-41040 and CVE-2022-41082 Updated Mitigations)