Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
A vulnerability has been reported in Microsoft Exchange Server 2016, which can be exploited by people with malicious intent to cause security bypass in order to manipulate data.
IMPACT: MEDIUM
PUBLISH DATE: 13-DEC-2018
OVERVIEW
An error when handling profile data in Microsoft Exchange Server can be exploited to manipulate profile data of another user via a specially crafted request. Updates are available that patch this vulnerability.
ANALYSIS
The tampering vulnerability is triggered when Microsoft Exchange Server fails to properly handle profile data, aka “Microsoft Exchange Server Tampering Vulnerability.” This affects Microsoft Exchange Server 2016.
An attacker would need to be authenticated on an affected Exchange Server in order to exploit this vulnerability. The attacker can then exploit this vulnerability by sending a specially modified request to the server, targeting a specific user. The vulnerability is therefore categorized as a Failure to Handle Exceptional Conditions.
It is also a security bypass vulnerability, as an attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions.
AFFECTED PRODUCTS
Microsoft Exchange Server 2016
UPDATES
Apply the following updates:
https://www.microsoft.com/downloads/details.aspx?familyid=0c76d4d9-458d-4080-919e-c5e8849426a1
https://www.microsoft.com/downloads/details.aspx?familyid=655aee71-5a2e-452e-b373-f4f38f42b862
If you think you’re a victim of a cyber-attack, immediately send an e-mail to soc@rewterz.com.