{"id":7507,"date":"2021-09-15T19:45:16","date_gmt":"2021-09-16T02:45:16","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7507"},"modified":"2023-04-11T10:21:55","modified_gmt":"2023-04-11T17:21:55","slug":"microsoft-exchange-proxyshell-and-windows-petitpotam-vulnerabilities-chained-in-new-attack","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/microsoft-exchange-proxyshell-and-windows-petitpotam-vulnerabilities-chained-in-new-attack\/","title":{"rendered":"Microsoft Exchange ProxyShell and Windows PetitPotam vulnerabilities chained in New Attack"},"content":{"rendered":"
{Updated on November 11, 2021}: <\/strong>On November 4, 2021, a new threat actor called the Tortilla Gang was identified as actively hacking Exchange Servers and breaching corporate networks using the ProxyShell vulnerabilities, leading to device encryption by deployment of Babuk ransomware. The Tortilla gang was also noted using the China Chopper webshell on breached servers. It is still uncertain whether Tortilla is an affiliate of the original Babuk gang, or if they are using a strain of the source code that was released on hacker forums in September 2021. Most of the attacks targeted US-based companies although other attacks in Germany, Thailand, Brazil and the UK, were also attributed to the Tortilla gang.<\/p><\/blockquote>\n
On July 23, 2021, Microsoft published an advisory<\/a> about a new NTLM relay attack called PetitPotam. The PetitPotam technique (tracked as CVE-2021-36942<\/a>) performs a relay attack that does not rely on the Microsoft Print System Remote Protocol (MS-RPRN) API, but instead uses the Microsoft Encrypting File System Remote Protocol (MS-EFSRPC), which maintains and manages operations on encrypted data that is stored remotely and accessed over a network. This vulnerability can allow a remote attacker to take full control of a domain controller, and thus, an entire Windows domain.<\/p>\n
Soon after the proof-of-concept (POC) of the attack was released on July 22, Microsoft issued a security advisory<\/a> to mitigate the issue. CISA issued an alert<\/a> to Microsoft customers to fix the NTLM issue, but unfortunately, the update was inefficient<\/a> and PetitPotam was still open to active abuse.<\/p>\n
It was not until August 23<\/a> that security researchers discovered that the new LockFile ransomware was actively abusing the faulty patch to the PetitPotam vulnerability, post-exploitation, to gain access to domain controllers and spread across the network. The LockFile ransomware had been exploiting the Microsoft ProxyShell since August 13<\/a> and most likely used the ProxyShell vulnerabilities<\/a> to gain access to victims\u2019 networks before abusing the PetitPotam flaw.<\/p>\n
Microsoft Exchange servers were actively being exploited by the ProxyLogon vulnerabilities in early 2021. The Exchange instances are now back again, dubbed as ProxyShell. Tracked as CVE-2021-34473<\/a>, CVE-2021-34523<\/a>, and CVE-2021-31207<\/a>, the ProxyShell vulnerabilities can allow an attacker to execute arbitrary code on a victim\u2019s system and be able to run code remotely without authentication, if the vulnerabilities are chained. The ProxyShell vulnerabilities are also being used to exploit networks and install backdoors which can later be used as access points for persistence attacks. After breaching unpatched Exchange servers, threat actors drop web shells that allow them to upload malicious tools and execute them.<\/p>\n
Interestingly, CISA issued an alert <\/a>to Microsoft on August 21 regarding these vulnerabilities in MS Exchange.\u00a0<\/strong><\/p>\n
Our CVE Analysis<\/strong><\/h2>\n
CSW researchers looked at ProxyShell and PetitPotam vulnerabilities. Here is their analysis:<\/strong><\/p>\n
\n
- \n
CVE-2021-34473<\/a> is a critical vulnerability (CVSS 9.8) that can be exploited to execute custom code remotely. This is a pre-authorization path confusion vulnerability that can result in ACL bypass, effectively giving access to backend URLs. A full working proof-of-concept<\/a> exploit is available for the vulnerability as well.<\/p>\n<\/li>\n
- \n
CVE-2021-34523<\/a> is a critical remote code execution vulnerability with a CVSS v3 score of 9.8. The CVE targets open instances of the PowerShell Backend and has a full working exploit<\/a> online.<\/p>\n<\/li>\n
- \n
CVE-2021-31207<\/a> is a high vulnerability with a CVSS v3 score of 7.2. This is a security feature bypass vulnerability that can cause post-authorization arbitrary file writes, the end result being remote code execution by attackers. An exploit<\/a> is available online for the vulnerability.<\/p>\n<\/li>\n<\/ul>\n
Security patches<\/a> for all the three ProxyShell vulnerabilities were released in April 2021.\u00a0<\/strong><\/p>\n
\n
- \n
CVE-2021-36942<\/a> is a high-impact vulnerability with a CVSS v3 score of 7.5. Researchers have also recently released a proof-of-concept<\/a> exploit that can take advantage of the vulnerability to compromise Windows Servers. The PetitPotam vulnerability directly affects the Encrypting Files System Remote protocol (MS-EFSRPC).<\/p>\n<\/li>\n<\/ul>\n
\nMicrosoft claimed that new micro-patches were released with the August 2021 Patch Tuesday update, to address the PetitPotam vulnerability and that installing Windows Update and patch would mitigate the issue. Though initially lauded for a quick resolution, it was soon discovered that the patches were incomplete<\/a>, thereby allowing remote attacks.<\/strong><\/p>\nUnlocking LockFile ransomware<\/strong><\/h2>\n
Not much is known about the newly minted LockFile ransomware yet.<\/p>\n
Our researchers did a deep dive to find out more about the new ransomware.<\/p>\n
We noted that the email address disclosed to the target to negotiate the ransom (contact@contipauper.com) might point to a possible association with the Conti group, although it is still highly uncertain.<\/p>\n
The color schemes of the ransom notes are similar to that of the Conti group, but the wording of the ransom message and the communication methods are very similar to the LockBit 2.0 ransomware operation.<\/p>\n
<\/p>\n
The LockFile ransomware uses a unique intermittent encryption scheme<\/a> to evade ransomware defenses. The novel file-encrypting malware scrambles only every 16 bytes of a file so that the file is partially readable and thereby tricks the defense mechanisms in place to block ransomware attacks. This technique of partially encrypting files has been a new trend observed by researchers and notably used by the BlackMatter, DarkSide<\/a>, and Lockbit 2.0<\/a> ransomware in their exploits.<\/p>\n
<\/p>\n
Vulnerable Products<\/strong><\/h2>\n
With a new surge in attacks on Microsoft Exchange products, CSW researchers identified certain products that were more vulnerable to active exploits than others.<\/p>\n
The ProxyShell vulnerabilities affect Microsoft Exchange Servers 2013, 2016, and 2019.<\/p>\n
Individuals and organizations using Windows 7 Service Pack 1 or Windows Server 2008 R2 Service Pack 1 and later are encouraged to do a system backup and get an updated version to fix the PetitPotam vulnerability.<\/p>\n
What is the Global Exposure?\u00a0<\/strong><\/h2>\n
Our researchers found direct CVE exposures for the ProxyShell vulnerabilities on Shodan on August 18. The exposure was the same for all three ProxyShell CVEs and points to more than 80,000 potentially vulnerable Internet-facing MS Exchange products.<\/p>\n
No exposure for the PetitPotam vulnerability was found on Shodan at the time this blog was written.<\/p>\n
\u00a0<\/p>\n
Our analysts encourage you to update and patch your systems now.<\/strong><\/h2>\n
Our analysts also encourage MS Exchange users to install the latest cumulative updates<\/a> to patch the ProxyShell vulnerabilities and use the unofficial partial patch<\/a> for the PetitPotam vulnerability to block the relay attack. PetitPotam attacks can also be blocked by applying a NETSH RPC filter<\/a> that helps to block access to vulnerable functions in the Encrypting Files System Remote protocol API.<\/p>\n
CSW analysts urge administrators to install the latest updates as well as create offline backups of their servers on priority.<\/strong><\/p><\/blockquote>\n