Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. This may lead to unauthorized modification of system or user information.
A tampering security bypass vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. In case of a successful attack, this vulnerability can be exploited by a remote authenticated user to modify a targeted user’s profile data or a system’s information.
The profile or system data can be modified by a remote authenticated user by sending specially crafted requests to the target Microsoft Exchange server.
This process exploits a security bypass vulnerability in the processing of profile data and modifies the target user’s profile data.
To exploit the vulnerability, an attacker would need to be authenticated on an affected Exchange Server. The attacker would then proceed to send the specially modified request to the server, targeting a specific user. The security update addresses the vulnerability by modifying how Microsoft Exchange Server handles profile data.
Microsoft Exchange Server 2016 Cumulative Update 10
Microsoft Exchange Server 2016 Cumulative Update 9
Apply the following updates to the relevant systems:
It is best to immediately update the running versions of the affected products as per the advisory. Furthermore, if you think you are a victim of a cyber-security attack. Immediately send an email to info@rewterz.com for a rapid response.