Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2020.0045.2 Microsoft Patch Tuesday (February 2020): Microsoft Exchange Server 9 March 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Exchange Server 2010 SP3 Exchange Server 2013 Exchange Server 2016 Exchange Server 2019 Operating System: Windows Impact/Access: Administrator Compromise -- Existing Account Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-0692 CVE-2020-0688 Member content until: Saturday, March 14 2020 Revision History: March 9 2020: Reports are circulating that CVE-2020-0688 is being exploited in the wild. February 13 2020: Initial Release OVERVIEW Microsoft has released its monthly security patch update for the month of February 2020. This update resolves 2 vulnerabilities across the following products: [1] Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30 Microsoft Exchange Server 2013 Cumulative Update 23 Microsoft Exchange Server 2016 Cumulative Update 14 Microsoft Exchange Server 2016 Cumulative Update 15 Microsoft Exchange Server 2019 Cumulative Update 3 Microsoft Exchange Server 2019 Cumulative Update 4 There are reports that CVE-2020-0688, an authenticated RCE, is being exploited in the wild. [2] IMPACT Microsoft has given the following details regarding these vulnerabilities. Details Impact Severity CVE-2020-0688 Remote Code Execution Important CVE-2020-0692 Elevation of Privilege Important MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Catalogue for the following Knowledge Base articles. [1] KB4536989, KB4536987, KB4536988 REFERENCES [1] Microsoft Security Update Guidance https://portal.msrc.microsoft.com/en-us/security-guidance [2] Volexity Threat Research: Microsoft Exchange Control Panel (ECP) Vulnerability CVE-2020-0688 Exploited https://www.volexity.com/blog/2020/03/06/microsoft-exchange-control-panel-ecp-vulnerability-cve-2020-0688-exploited/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXmXNdmaOgq3Tt24GAQjsvg//duTExI00MQoTT+iDwaKej0Kmt559KVdC h2MJsB8NZOQgzj4QNblzD4mwXkWAaIb9JH/afKSacxTgsaimCkaVg3Zar1uwlHDB LAT0B6DxRvTAUd7zcQDMDrl/LLwpfcOBbYsn0X2ui8TFaddbrDXT/DLDvU6tNMaL bEKUtwmOgahYtaFjONg0JUrkyKSwDhXKvewLsXepD22uKuV01ROntZEVUmDdN9PH Qny21+mSarHjmyIEu4/hDvf8Dj/Mfwl8r7kA0yX7xqG8uh6TryLrJWiEpW6/Pret 42Y1i15Zm9NWj3ww8w0dMLMIkJIJ3nAK9GaftQcdaNBIcySpoAI7J7GpYNKlXgoa C1L/Aer/9enxVPWhMqyYl8p8zkFZJfBN8lihwM3VUi0esBoG5fqucQM8vxtAxHe4 jrcaGGCHXP0OzkEUZiHcjFAY2eZCYsGKgnWMjJ+F+7QUvc0hesq027GxYLUnXapH J2YH1Ctz5voaydWPYeo41h70sQuIEGmAdeVZaQWORzfrEa0YXxJBrkrs+z6X9Ozv iwrZm+d4B9LtIWuKJw8iv0iGJh+NgaMlYfhjSWdpoAVQ2X8wKuecFIdpEyCux0dH y8hJCFnDnZ+4gQpCav6JLJ8YJsefPt/asVvEOjKYaG9bIVG9yAyvFiDhNkuBBjx7 F9MgNOWs6cU= =MgQg -----END PGP SIGNATURE-----