Microsoft: IT Admins Need to Take ‘Immediate Action’ to Fix Server Bugs

According to Microsoft, Expanded Protection is needed to fix critical security flaws and prevent the potential loss of data.

IT admins, take note — Microsoft is urging administrators to apply security updates and enable Extended Protection immediately, after a number of Exchange Server flaws have been brought to its attention.

The company addressed 121 flaws in its security patch earlier this week. But they fear remote attackers could still exploit certain Exchange vulnerabilities to deliver malware, unless swift action is taken.

With the warning already garnering the attention of Cybersecurity and Infrastructure Security Agency (CISA), it’s clear that Microsoft’s message should be taken seriously. So, to prevent your Exchange Server from becoming compromised — and to avoid similar cyberattacks in the future — here’s what you can do.

Exchange Bugs are Vulnerable to Attack, Microsoft Warns

Earlier this week, Microsoft conducted its ‘August 2022 Patch’, where the company addressed a total of 121 flaws.

Out of the ‘fixed’ security holes, 17 were classified as critical because they allow for remote code execution or elevation of privileges – including the ‘DogWalk Windows zero-day vulnerability’, and several ‘Microsoft Exchange vulnerabilities’, which grant attackers access to private user emails and passwords.

Despite efforts made by Microsoft’s security team, the Exchange vulnerabilities still appear to be at risk of being exploited. This leaves many Microsoft users vulnerable to hackers, who could use phishing emails and chat messages to dupe them into accessing malicious servers.

“Microsoft analysis has shown that exploit code could be created in such a way that an attacker could consistently exploit this vulnerability. Moreover, Microsoft is aware of past instances of this type of vulnerability being exploited.” – Microsoft

In Microsoft’s Exploitability Index, the company also warned that vulnerabilities of this kind could be subject to repeat attacks unless IT admins take necessary action. Luckily, there are steps you can take to protect your server. We outline them below.

How Can IT Admins Fix These Vulnerabilities?

Apply Microsoft’s Latest Security Updates

The first course of action administrators can take is installing Microsoft’s latest security updates.

The company has recently released updates for vulnerabilities found in Exchange Server 2013, 2016, and 2019. According to Microsoft, they are not currently aware of any active exploits in the wild, but would still advise admins to implement them immediately.

“Although we are not aware of any active exploits in the wild, our recommendation is to immediately install these updates to protect your environment.” – Microsoft

For more information on these common vulnerabilities and exposures, you can refer to the company’s Security Update Guide.

Enable Expanded Protection

Aside from applying the latest security updates, Microsoft is also urging admins to enable Extended Protection. Extended Protection is a security tool that enhances Windows Server authentication and helps to mitigate third-party attacks.

Microsoft has recently released a script to enable this feature, but they warn admins to carefully evaluate their environments before implementing the measure. Also, they note that the script must be run as Administrator in Exchange Management Shell on an Exchange Server in order to be effective.

Be Wary of Phishing Attacks

To exploit this type of vulnerability, victims need to be exposed to a malicious server first. Hackers use various phishing strategies to draw users in, including email, HTTPS phishing, and pop-up phishing.

To prevent these bad actors from gaining access to your company’s server, we recommend configuring staff accounts by giving staff the lowest level of user rights. This way, if any workers fall victim to phishing attacks, the level of damage will be reduced.

It’s also important to keep an eye out for unusual requests from unreliable sources —and to make sure your wider workforce remains skeptical online too. This way, hackers can be blocked at the gate and your private data can be kept secured.

For information on how to evade phishing attacks, and on how to stay safe online, read our top internet safety tips.

Did you find this article helpful? Click on one of the following buttons
We're so happy you liked! Get more delivered to your inbox just like it.

We're sorry this article didn't help you today – we welcome feedback, so if there's any way you feel we could improve our content, please email us at contact@tech.co

Written by:
Isobel O'Sullivan (BSc) is a senior writer at Tech.co with over four years of experience covering business and technology news. Since studying Digital Anthropology at University College London (UCL), she’s been a regular contributor to Market Finance’s blog and has also worked as a freelance tech researcher. Isobel’s always up to date with the topics in employment and data security and has a specialist focus on POS and VoIP systems.
Explore More See all news
Back to top
close Thinking about your online privacy? NordVPN is Tech.co's top-rated VPN service See Deals