• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Microsoft Windows Adobe Flash Player Multiple Vulnerabilities
August 15, 2018
Rewterz Threat Advisory – CVE-2018-6973 and CVE-2018-3646 VMWare Workstation Player Multiple Vulnerabilities
August 16, 2018

Rewterz Threat Advisory – CVE-2018-8374 Microsoft Exchange Server Tampering Vulnerability

August 15, 2018

A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. This may lead to unauthorized modification of system or user information.

 

 

IMPACT:  NORMAL

PUBLISH DATE:  15-08-2018

OVERVIEW

A tampering security bypass vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. In case of a successful attack, this vulnerability can be exploited by a remote authenticated user to modify a targeted user’s profile data or a system’s information.

 

 

ANALYSIS

The profile or system data can be modified by a remote authenticated user by sending specially crafted requests to the target Microsoft Exchange server.

 

This process exploits a security bypass vulnerability in the processing of profile data and modifies the target user’s profile data.

 

To exploit the vulnerability, an attacker would need to be authenticated on an affected Exchange Server. The attacker would then proceed to send the specially modified request to the server, targeting a specific user. The security update addresses the vulnerability by modifying how Microsoft Exchange Server handles profile data.

 

 

AFFECTED PRODUCTS

Microsoft Exchange Server 2016 Cumulative Update 10

Microsoft Exchange Server 2016 Cumulative Update 9

 

 

UPDATES

Apply the following updates to the relevant systems:

 

  • Microsoft Exchange Server 2016 Cumulative Update 10 https://www.microsoft.com/downloads/details.aspx?familyid=4392a20a–0c93–4385–bebd–809f8ca5213b

 

  • Microsoft Exchange Server 2016 Cumulative Update 9 https://www.microsoft.com/downloads/details.aspx?familyid=4392a20a–0c93–4385–bebd–809f8ca5213b

 

 

It is best to immediately update the running versions of the affected products as per the advisory. Furthermore, if you think you are a victim of a cyber-security attack. Immediately send an email to info@rewterz.com for a rapid response.  

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.