This dangerous vulnerability tricks researchers by mimicking old threats

Cybersecurity researchers have discovered a new zero-day vulnerability that has surfaced in Microsoft’s Exchange email servers and has already been exploited by bad actors.

The yet-to-be-named vulnerability has been detailed by cybersecurity vendor GTSC, though information about the exploit is still being collected. It is considered a “zero-day” vulnerability due to the fact that public access to the flaw was apparent before a patch could be made available.

? There’s reports emerging that a new zero day exists in Microsoft Exchange, and is being actively exploited in the wild ?

I can confirm significant numbers of Exchange servers have been backdoored – including a honeypot.

Thread to track issue follows:

— Kevin Beaumont (@GossiTheDog) September 29, 2022

News of the vulnerability was first submitted to Microsoft through its Zero Day Initiative program last Thursday September 29, detailing that the exploits of malware CVE-2022-41040 and CVE-2022-41082 “could allow an attacker the ability to perform remote code execution on affected Microsoft Exchange servers, according to Trend Micro.

Microsoft stated on Friday that it was “working on an accelerated timeline” to address the zero-day vulnerability and create a patch. However, researcher Kevin Beaumont confirmed on Twitter that the flaw has been used by nefarious players to gain access to the back ends of several Exchange servers.

With the exploitation already in the wild, there are ample opportunities for businesses and government entities to be attacked by bad actors. This is due to the fact that Exchange servers rely upon the internet and cutting connections would sever productivity for many organizations, Travis Smith, vice president of malware threat research at Qualys, told Protocol.

While details of exactly how the CVE-2022-41040 and CVE-2022-41082 malware work is not known, several researchers noted similarities to other vulnerabilities. These include the Apache Log4j flaw and the “ProxyShell” vulnerability, which both have remote code execution in common. In fact, several researchers mistook the new vulnerability for ProxyShell until it was made clear that the old flaw was up to date on all of its patches. This made it clear that CVE-2022-41040 and CVE-2022-41082 are completely new, never-before-seen vulnerabilities.

“If that is true, what it tells you is that even some of the security practices and procedures that are being used today are falling short. They get back to the inherent vulnerabilities in the code and the software that are foundational to this IT ecosystem,” Roger Cressey, former member of cybersecurity and counterterrorism for the Clinton and Bush White Houses, told DigitalTrends.

“If you have a dominant position in the market, then you end up whenever there’s an exploitation you think you’ve solved but it turns out there are other ones associated with it that pop up when you least expect it. And exchange is not exactly the poster child for what I would call a secure, a secure offering,” he added. 

Malware and zero-day vulnerabilities are a fairly consistent reality for all technology companies. However, Microsoft perfected its ability to identify and remediate issues, and make available patching for vulnerabilities in the aftermath of an attack.

According to the CISA vulnerabilities catalog, Microsoft Systems has been subject to 238 cybersecurity deficiencies since the beginning of the year, which accounts for 30% of all discovered vulnerabilities. These attacks include those against other major technology brands including Apple iOS, Google Chrome, Adobe Systems, and Linux, among many others.

“There are a lot of technology IT companies that have zero days that are discovered and are exploited by adversaries. The problem is Microsoft has been so successful at dominating the marketplace that when their vulnerabilities are discovered, the cascading impact that it has in terms of scale and reach is incredibly big. And so when Microsoft sneezes, the critical infrastructure world catches a bad cold and that seems to be a repeating process here,” Cressey said.

One such zero-day vulnerability that was resolved earlier this year was Follina (CVE-2022-30190), which granted hackers access to the Microsoft Support Diagnostic Tool (MSDT). This tool is commonly associated with Microsoft Office and Microsoft Word. Hackers were able to exploit it to gain access to a computer’s back end, granting them permission to install programs, create new user accounts, and manipulate data on a device.

Early accounts of the vulnerability’s existence were remedied with workarounds. However, Microsoft stepped in with a permanent software fix once hackers began to use the information they gathered to target the Tibetan diaspora and U.S. and E.U. government agencies.

Related posts

Latest posts

Meta’s Oakley smartglasses could be the next big wearable trendsetter

Meta is apparently developing a new pair of smartglasses with popular eyewear brand Oakley, as well as expanding its Ray-Ban Meta range, according to a new report.

Nvidia’s RTX 50-series might give us a repeat of the GPU shortage

Nvidia’s RTX 5090 and RTX 5080 are set to release later this month, and there’s no doubt that they’ll end up being some of the of the year. Unfortunately, it also seems that they might be hard to come by, as many sources expect that the will have very limited availability to start with.  If […]

Nvidia says melting power connectors are a thing of the past

Nvidia is confident there will be no melting connectors thanks to the 12V-2x6 standard featured on its RTX 50-series GPUs.

The RTX 5090 is absolutely stunning — but Nvidia made one annoying change

Nvidia's RTX 5090 Founder's Edition is one of the best-looking GPUs I've ever seen, but it has one annoying problem.

Is your Fitbit getting too hot? Google wants to give you $50

The Fitbit Sense and Fitbit Versa 3 smartwatches are at risk of overheating. Google has issued a firmware update, but it reduces overall battery life.

Careful — this Google ad could swipe your bank data without you knowing

This malicious Google ad for the Homebrew website was almost impossible to spot because it displayed the correct URL before people clicked on it.

Face controls are coming to Chromebooks, and they look wild

Google adds helpful feature to Chromebooks that allows users to control their Chromebook with their faces. This is great news for those with motor impairments.

The iPhone now has an app to automatically block spam calls

One of the most popular tools for identifying unknown callers and blocking spam calls and SMS messages has received new functionality for iPhone.

Nothing just dropped a cryptic teaser, and it involves Pokémon

Nothing has released another characteristically cryptic teaser for an upcoming product: a single image of the Pokémon Arcanine.

The Samsung Galaxy S25 is less of an upgrade than I expected

The Galaxy S24 and were incremental improvements over previous generations, but those small improvements resulted in a bigger overall improvement than it first seemed. Fast-forward a year, and Samsung has followed the same mold again, but with fewer changes than I can remember in recent history. The Galaxy S25 and Galaxy S25 Plus look and […]