Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

You're an admin! You're all admins, thanks to this Microsoft Exchange zero-day and exploit
The Register ^ | Jan 25, 2019 | Thomas Claburn

Posted on 01/24/2019 8:28:38 PM PST by dayglored

Easily swapped hashed passwords gives Domain Admin rights via API call. Fix may land next month

Microsoft Exchange appears to be currently vulnerable to a privilege escalation attack that allows any user with a mailbox to become a Domain Admin.

On Thursday, Dirk-jan Mollema, a security researcher with Fox-IT in the Netherlands, published proof-of-concept code and an explanation of the attack, which involves the interplay of three separate issues.

According to Mollema, the primary problem is that Exchange has high privileges by default in the Active Directory domain.

"The Exchange Windows Permissions group has WriteDacl access on the Domain object in Active Directory, which enables any member of this group to modify the domain privileges, among which is the privilege to perform DCSync operations," he explains in his post.

This allows an attacker to synchronize the hashed passwords of the Active Directory users through a Domain Controller operation. Access to these hashed passwords allows the attacker to impersonate users and authenticate to any service using NTLM (a Microsoft authentication protocol) or Kerberos authentication within that domain.

Mollema wasn't immediately available to discuss his work due to time zone differences and the need to involve a media handler.

The attack relies on two Python-based tools: privexchange.py and ntlmrelayx.py. It has been tested on Exchange 2013 (CU21) on Windows Server 2012 R2, relayed to (fully patched) Windows Server 2016 DC and Exchange 2016 (CU11) on Windows Server 2016, and relayed to a Server 2019 DC, again fully patched.

Using NTLM, Mollema says it's possible to transfer automatic Windows authentication, which occurs upon connection to the attacker's machine, to other machines on the network.

How then to get Exchange to authenticate the attacker? Mollema points to a ZDI researcher who found a way to obtain Exchange authentication using an arbitrary URL over HTTP through the Exchange PushSubscription API using a reflection attack.

If this technique is instead used to perform a relay attack against LDAP, taking advantage of Exchange's high default privileges, it's possible to for the attacker to obtain DCSync rights.

Mollema describes several potential mitigations for the attack in his post. These include: reducing Exchange privileges on the Domain object; enabling LDAP signing and channel binding; blocking Exchange servers from connecting to arbitrary ports; enabling Extended Protection for Authentication on Exchange endpoints in IIS; removing the registry key that allows relaying; and enforcing SMB signing.

In a statement emailed to The Register, Microsoft avoided commenting on the specific vulnerability described by Mollema, but the wording of its coy, content-free reply suggests the company may issue a fix in February.

“Microsoft has a strong commitment to security and a demonstrated track record of investigating and proactively updating impacted devices as soon as possible," a Microsoft spokesperson said. "Our standard policy is to release security updates on Update Tuesday, the second Tuesday of each month." ®


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: exchange; exploit; hack; microsoft; windows; windowspinglist
Here's one for the Windows Admins among us FReepers. Regular Windows users tend to not have an Exchange Server sitting in their living room.

Never a dull moment, when you've got an Exchange Server on site...

1 posted on 01/24/2019 8:28:38 PM PST by dayglored
[ Post Reply | Private Reply | View Replies]

To: Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; AppyPappy; arnoldc1; ATOMIC_PUNK; bajabaja; ...
MS Exchange Privilege Exploit ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

2 posted on 01/24/2019 8:29:13 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
Original title had an extra exclamation:
You're an admin! You're an admin! You're all admins, thanks to this Microsoft Exchange zero-day and exploit

3 posted on 01/24/2019 8:30:18 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
p78

That's it. We're migrating back to GroupWise.

4 posted on 01/24/2019 8:34:43 PM PST by Snickering Hound
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
I don't understand any of this, can you please explain it in simple language?

I understand that now anyone can use the code to do whatever, but exactly WHAT is the "whatever"?

5 posted on 01/24/2019 8:36:39 PM PST by nopardons
[ Post Reply | Private Reply | To 3 | View Replies]

To: dayglored
Still it's a great excuse to post this.


6 posted on 01/24/2019 8:40:45 PM PST by thoughtomator (Nobody is coming to save the day)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nopardons
This article is only of interest to professional Windows System Administrators who use Microsoft's "Exchange" software to manage email servers. Everyone else, and I suspect you fall in this category, can pretty much ignore it since it doesn't apply to regular Windows use.

The article describes a vulnerability in the Exchange software that can lead to bad things in the server.

7 posted on 01/24/2019 8:43:49 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 5 | View Replies]

To: dayglored
Thanks, that's what I thought, but since I'm NOT well versed in tech stuff, I'd better ask.

Yes, this doesn't apply to me at all.

8 posted on 01/24/2019 8:48:44 PM PST by nopardons
[ Post Reply | Private Reply | To 7 | View Replies]

To: Snickering Hound
LOL!

Ah, GroupWare...

9 posted on 01/24/2019 8:50:42 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 4 | View Replies]

To: dayglored
We don' need no stinkin' DOMAIN admin privileges..."


We want Enterprise admin privileges.



Wake me when there's real news.

10 posted on 01/24/2019 10:03:31 PM PST by Paal Gulli
[ Post Reply | Private Reply | To 2 | View Replies]

To: Paal Gulli

I want that so I can set auto destruction for printers.


11 posted on 01/25/2019 5:54:20 AM PST by wally_bert (We're low on dimes in fun city.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: dayglored
Regular Windows users tend to not have an Exchange Server sitting in their living room.

Yeah, but the vast majority of them have some convenient servers sitting right inside their corporate firewalls.

12 posted on 01/25/2019 6:43:53 AM PST by zeugma (Power without accountability is fertilizer for tyranny.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored
This article is only of interest to professional Windows System Administrators who use Microsoft's "Exchange" software to manage email servers. Everyone else, and I suspect you fall in this category, can pretty much ignore it since it doesn't apply to regular Windows use.

I'd disagree somewhat. According to the article it appears that you can remotely escalate your privs using the exchange server to do so. It is up to the domain admins to figure out some way to mitigate, but anyone in a position of authority in a corporate environment should take note of this, because it could make hacker's lives pretty easy until it is fixed. From what I understand, 70+ of all hacking is done by internal folks.

13 posted on 01/25/2019 6:49:23 AM PST by zeugma (Power without accountability is fertilizer for tyranny.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: wally_bert
I want that so I can set auto destruction for printers.

I have never run into a corporate printer that was secured to any degree at all. The big multifunction printers are actually big computers themselves. Many have webservers and such built into them that are never reset from the default admin passwords. They also tend to have FTP servers built in, and if they can receive faxes, they can also dial out.

Setting up these printers to do interesting things at odd hours is pretty easy.

14 posted on 01/25/2019 6:53:39 AM PST by zeugma (Power without accountability is fertilizer for tyranny.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: zeugma

I plainly and completely despise printers.


15 posted on 01/25/2019 7:00:25 AM PST by wally_bert (We're low on dimes in fun city.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: zeugma
> ... anyone in a position of authority in a corporate environment should take note of this, because it could make hacker's lives pretty easy until it is fixed. From what I understand, 70+ of all hacking is done by internal folks.

Good point.

16 posted on 01/25/2019 10:00:13 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 13 | View Replies]

To: wally_bert
I plainly and completely despise printers.

"Damn, it feels good to be a gangsta!"

17 posted on 01/25/2019 10:04:21 AM PST by dfwgator (Endut! Hoch Hech!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: dayglored

I am glad our company has moved our email to microsoft office 365..... our email is safe in the “cloud”.


18 posted on 01/25/2019 8:41:17 PM PST by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson