Search
  • For Individuals
      « Back
    • Windows Data Recovery

      Recovers lost or deleted Office documents, emails, presentations & multimedia files.

      Free Standard Professional Premium

    • Mac Data Recovery

      Recovers deleted files, photos, videos etc. on Mac.

      Free Standard Professional Premium

    • Photo Recovery

      Recover photos, videos, & audio files from all cameras and storage on Windows or Mac.

      Free Standard Professional Premium

    • Video Repair
    • Photo Repair
    • iPhone Data Recovery
  • For Business
      « Back
    • Email Repair & Converter

      Repair for Exchange Converter for EDB Converter for OST Converter for NSF Converter for OST MBOX Repair for Outlook

    • Database & File Repair

      Repair for MS SQL Repair for Access Repair for QuickBooks Software Repair for Excel Extractor for Windows Backup Repair for MySQL

    • Data Recovery & Erasure

      Data Recovery Professional Data Recovery Technician Mac Recovery for Technician Virtual Machine Recovery File Erasure Software Mobile Erasure Drive Erasure File Eraser Software File Eraser Software for Mac

    • Toolkit

      Exchange Toolkit Outlook Toolkit File Repair Toolkit MS SQL Toolkit Data Recovery Toolkit

    • Forensic

      Email Forensic Exchange Auditor Log Analyzer for MySQL Log Analyzer for MS SQL

  • Store
  • Partners
  • Services
  • Offers
  • Support

 

  • For Individuals
    DIY software for anyone who works with data.

    Windows Data Recovery Recovers lost or deleted Office documents, emails, presentations & multimedia files

    Free Standard Professional Premium

    Mac Data Recovery Especially for Mac users to recover deleted documents and multimedia files from macOS

    Free Standard Professional Premium

    Video Repair Windows Mac Repair multiple corrupt videos in one go. Supports MP4, MOV & other formats.

    StandardPremium

    Photo Recovery Windows Mac Recover photos, videos, & audio files from all cameras and storage on Windows or Mac.

    Standard Professional Premium

    iPhone Data Recovery Windows Mac Recover deleted photos, videos, contacts, messages etc. directly from iPhone & iPad

    Recover Erase Toolkit

    Photo Repair Windows Mac Repair multiple corrupt photos in one go. Supports JPEG & other formats.

    Standard Professional Premium


  • For Business
    • Email Repair
    • Email Converter
    • File Repair
    • Data Recovery & Erasure
    • Toolkit
    • Forensic

    Exchange Repair Repair corrupt EDB file & export mailboxes to Live Exchange or Office 365

    Outlook PST Repair Repair corrupt PST & recover all mailbox items including deleted emails & contacts

    OLM Repair Repair Outlook for Mac (OLM) 2011 & 2016 backup files & recover all mailbox items

    Exchange Toolkit Repair EDB & Exchange backup file to restore mailboxes, convert OST to PST, & convert EDB to PST

    Active Directory Repair Repair corrupt Active Directory database (Ntds.dit file) & extract all objects in original form

    EDB to PST Convert online & offline EDB file & extract all mailbox items including Public Folders in PST

    OST to PST Convert inaccessible OST file & extract all mailbox items including deleted emails in PST

    NSF to PST Convert IBM Notes NSF file & export all mailbox items including emails & attachments to PST

    MBOX to PST Convert MBOX file of Thunderbird, Entourage & other clients, & export mailbox data to PST

    OLM to PST Convert Outlook for Mac Data File (OLM) & export all mailbox data to PST in original form

    GroupWise to PST Convert GroupWise mail & export all mailbox items - emails, attachments, etc. - to PST

    EML to PST Convert Windows Live Mail (EML) file & export mailbox data - emails, attachments, etc. - to PST

    Office 365 to PST Connect to Office 365 account & export mailbox data to PST and various other formats

    DBX to PST Convert Outlook Express (DBX) file & export all mailbox data - emails, attachments, etc. - to PST

    SQL Repair Repair corrupt .mdf & .ndf files and recover all database components in original form

    Access Repair Repair corrupt .ACCDB and .MDB files & recover all records & objects in a new database

    QuickBooks Repair Repair corrupt QuickBooks® data file & recover all file components in original form

    MySQL Repair Repair MyISAM & InnoDB tables and recover all objects - keys, views, tables, triggers, etc.

    Excel Repair Repair corrupt Excel (.XLS & .XLSX) files and recover tables, charts, chart sheet, etc.

    BKF Repair Repair corrupt backup (BKF, ZIP, VHDX and .FD) files and restore complete data

    Database Converter Interconvert MS SQL, MySQL, SQLite, and SQL Anywhere database files

    PowerPoint Repair Repair corrupt PPT files and restore tables, header, footer, & charts, etc. like new

    File Repair Toolkit Repair corrupt Excel, PowerPoint, Word & PDF files & restore data to original form

    Data Recovery Windows Mac Recover lost or deleted data from HDD, SSD, external USB drive, RAID & more.

    Technician Toolkit

    Tape Data Recovery Retrives data from all types and capacities of tape drives including LTO 1, LTO 2, LTO 3, & others.

    Virtual Machine Recovery Recover documents, multimedia files, and database files from any virtual machine

    File Erasure Permanently wipe files and folders, and erase traces of apps and Internet activity.

    Standard Corporate

    Mobile Erasure Certified and permanent data erasure software for iPhones, iPads, & Android devices

    Drive Erasure Certified and permanent data erasure software for HDD, SSD, & other storage media Windows Mac

    Exchange Toolkit 5-in-1 software toolkit to recover Exchange database, convert EDB to PST, convert OST to PST, restore Exchange backup, and reset Windows Server password.

    Outlook Toolkit Comprehensive software suite to repair PST files, merge PST files, eliminate duplicate emails, compact PST files, and recover lost or forgotten Outlook passwords.

    File Repair Toolkit Powerful file repair utility to fix corrupt Word, PowerPoint, and Excel documents created in Microsoft Office. It also repairs corrupt PDF files and recovers all objects.

    MS SQL Toolkit 5-in-1 software toolkit to repair corrupt SQL database, restore database from corrupt backup, reset database password, analyze SQL logs, & interconvert databases.

    Data Recovery Toolkit Software helps to recovers deleted data from Windows, Mac and Linux storage devices. Also supports recovery from RAIDs & Virtual Drives.

    Email Forensic Advanced email forensic solution for cyber experts to audit, analyze, or investigate emails & gather evidences.

    Exchange Auditor Exchange Server monitoring solution to automate audits, scans and generate reports ìn real-time.

    Log Analyzer for MySQL Analyze forensic details of MySQL server database log files such as Redo, General Query, and Binary Log.

    Log Analyzer for MS SQL Track & analyze MS SQL Server database transactions log files.

    Email Forensic
    STELLAR EMAIL FORENSIC

    Advanced email forensic tool to analyze and collect the mailbox data of email clients

    Learn More arrow


    All Products arrow

    All Products arrow

    All Products arrow

    All Products arrow

  • Our Partners
  • Lab Services
  • microphone-icon-android

    Trending Searches

    Data Recovery

    Photo Recovery

    Video Repair

    iPhone Data Recovery

    File Erasure Software

    Exchange Repair

    OST to PST

    PST Repair

    Raid Recovery

    MS SQL Repair

  • English Deutsch Français Nederlands Italiano Español 日本語 简体中文
  • Support
Exchange Server 2 minute read

Patch ProxyShell Vulnerabilities on Microsoft Exchange Servers

Published on August 12th, 2021
Ravi Singh
Written By
Ravi Singh
Shaun Hardneck
Approved By
Shaun Hardneck

Summary: Researcher Orange Tsai disclosed the technical details related to the ProxyShell and ProxyLogon RCE vulnerabilities that were exploited by threat actors, such as Hafnium, to gain unauthorized access to the Exchange servers. Although Microsoft released security updates to patch these vulnerabilities, more than 400,000 Exchange servers are still exposed on the internet to new attacks. In this post, we’ve explained in detail about ProxyShell vulnerability and how you can mitigate the threats and patch the vulnerabilities.

Contents

  • What is ProxyShell Vulnerability?
  • How to Know If Attackers scanned Exchange Server?
  • How to Mitigate the Threat?
  • To Wrap Up

Exchange servers have always been on the target of threat actors to gain access to the sensitive and confidential information that they store. The pre-authenticated ProxyShell and ProxyLogon RCE vulnerabilities disclosed by Orange Tsai, principal researcher at DEVCORE – an information security firm, in January 2021 are considered one of the most severe vulnerabilities found in the history of MS Exchange. The threat actors exploited these vulnerabilities to access Exchange servers and install web shells, backdoors, and ransomware.

The threat actors and groups, such as Hafnium, had compromised more than 30,000 Exchange servers across the world by the time Microsoft released the mitigation tool and security updates to patch these vulnerabilities in March.

And now that the technical details and information on ProxyShell vulnerabilities are disclosed, threat actors are scanning vulnerable Exchange servers using the auto-discover URL disclosed by Tsai.

I may have an update – somebody is accessing /autodiscover/autodiscover.json to access MAPI and my IIS is writing out files and executing commands cc @peterjson pic.twitter.com/oBPG1bvshx

— Kevin Beaumont (@GossiTheDog) August 6, 2021

What is ProxyShell Vulnerability?

ProxyShell refers to three RCE vulnerabilities:

  • CVE-2021-34473 – Microsoft Exchange Server RCE Vulnerability (Patched in April)
  • CVE-2021-34523 – Microsoft Exchange Server Elevation of Privilege on Exchange PowerShell Vulnerability (Patched in April)
  • CVE-2021-31207 – Microsoft Exchange Server Security Feature Bypass Vulnerability (Patched in May)

When these vulnerabilities are chained together, they allow threat actors to perform unauthorized remote code execution on the Exchange servers. Although CVE-2021-34473 and CVE-2021-34523 were discovered in July, Microsoft has patched them quietly with the April security updates release.

However, technical details related to Microsoft Exchange ProxyShell RCE (Remote Code Execution) vulnerabilities were recently disclosed at the BlackHat USA 2021 conference. Security researchers PeterJson and Jang even reproduced the ProxyShell exploit and published an article providing more technical details on how threat actors possibly executed the exploit.

After the disclosure, threat actors are now actively scanning the Microsoft Exchange servers to exploit these vulnerabilities. Their initial attempts were unsuccessful but they have now modified their scans and using autodiscover URL disclosed by Tsai.

The URL appears to help threat actors identify vulnerable Exchange servers.

How to Know If Attackers scanned Exchange Server?

Researcher Kevin Beaumont advised Exchange and IT administrators to check IIS logs strings using the Azure Sentinel Keyword Query Language (KQL Query) for the following strings:

W3CIISLog

| where csUriStem == “/autodiscover/autodiscover.json”

| where csUriQuery has “/mapi/nspi/”

If the output results list the autodiscover URL, it indicates the threat actors scanned your server.  

How to Mitigate the Threat?

It is strongly advised to install the latest cumulative updates to safeguard your Exchange server against the attack.

For more details, you can refer to our blog on Microsoft Exchange Remote Code Execution Vulnerability Flaws and their Fixes.

To Wrap Up

Exchange servers are a well-known mail solution for government organizations and enterprises worldwide. They store emails and other data containing sensitive information, making them a primary target for the threat actors. According to Tsai’s survey, more than 400,000 Exchange servers are still exposed on the web and vulnerable to ProxyShell attacks. If you haven’t patched your Exchange server, now is the high time to do so as the technical details of the RCE attacks are out and more threat actors are actively looking for vulnerable Exchange servers.

About The Author

Ravi Singh

Ravi Singh is a Senior Writer at Stellar®. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.

Best Selling Products

Stellar Repair for Exchange

Stellar Repair for Exchange

Software recommended by MVPs & Administr

Read More
Stellar Toolkit for Exchange

Stellar Toolkit for Exchange

5-in-1 suite of specialized tools, highl

Read More
Stellar Converter for EDB

Stellar Converter for EDB

Stellar Converter for EDB is a professio

Read More
Stellar Converter for OST

Stellar Converter for OST

Powerful software trusted by Microsoft M

Read More

Leave a comment Cancel reply

Your email address will not be published. Required fields are marked *

49  −  45  =  

Table of Contents    arrow

  1. What is ProxyShell Vulnerability?
  2. How to Know If Attackers scanned Exchange Server?
  3. How to Mitigate the Threat?
  4. To Wrap Up

Categories

offer banner

Related Posts

related post
Exchange Server

How to Fix Error – Usage Error Invalid argument ‘Storage’. Options must be preceded by ‘-‘ or ‘/’?

Stellar Author Ravi Singh July 20, 2022 Read More
related post
Exchange Server

Microsoft Exchange Servers Worldwide Hit by a New IIS Backdoor

Stellar Author Ravi Singh July 5, 2022 Read More
related post
Exchange Server

New ToddyCat APT Gang Targeting Microsoft Exchange Servers

Stellar Author Ravi Singh June 24, 2022 Read More

Free Trial for 60 Days

Stellar Official Website

Stellar Data Recovery Inc.
48 Bridge Street Metuchen,
New Jersey 08840,
United States

ALSO AVAILABLE AT

Partner Logo

About

  • About us
  • Career
  • ISMS Policy
  • Privacy Policy
  • Terms of Use
  • License Policy
  • Refund Policy
  • End User License Agreement

RESOURCES

  • Blog
  • Articles
  • Product Videos
  • Knowledge Base
  • Case Studies
  • Whitepapers
  • Software Catalog

NEWS & EVENTS

  • News
  • Events

PARTNERS

  • Affiliates
  • Resellers
  • Distributors

Useful Links

  • Contact Us
  • Support
  • Special Offers
  • Student Discounts
  • Awards & Reviews
  • Downloads
  • Store
  • Sitemap
Follow Us

tw in yt

Stellar & Stellar Data Recovery are Registered Trademarks of Stellar Information Technology Pvt. Ltd. © Copyright 2022 Stellar Information Technology Pvt. Ltd. All Trademarks Acknowledged.

Hippa Logo tuv footer partner logo DMCA.com Protection Status
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device Read More Got it!