1 min read
1 min read
Amina Zilic : Thu, Nov 11, '21
UPDATE 15.11.2021.
Microsoft patches actively exploited Exchange, Excel zero-days (CVE-2021-42321). Please refer to their site for more details.
IMPORTANT NOTICE!
We have released a FREE version of DRONE that scans the machine against indicators of the Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-42321).
Download DRONE 1.7.2 from here
Run it with the command-line DRONE.exe -a vua -n
Note: If you have Chrome installed on the machine, you can also run DRONE in Tower mode in the browser by simply double-clicking the executable and enabling the Vulnerability scanner since we added the Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-42321) identifier to the Vulnerability Analyzer
Optionally, you can enable all analyzers (auto-pilot mode) to have an automated compromise assessment in parallel.
Below you can see the DRONE scanning process
CVE-2021-42321 is an RCE vulnerability in Microsoft Exchange Server. The flaw exists due to the improper validation of command-let (cmdlet) arguments. To exploit this vulnerability, an attacker would need to be authenticated to a vulnerable Exchange Server. Microsoft says they are aware of “limited targeted attacks” using this vulnerability in the wild. Additionally, this appears to be the same vulnerability in Exchange Server that was exploited at the Tianfu Cup, a Chinese cybersecurity contest.