Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Microsoft Exchange Autodiscover Bugs Leak 100K Windows Credentials

Microsoft Exchange Autodiscover Bugs Leak 100K Windows Credentials

Bugs in the implementation of Microsoft Exchange’s Autodiscover feature have leaked approximately 100,000 login names and passwords for Windows domains worldwide.

In a new report by Amit Serper, Guardicore’s AVP of Security Research, the researcher reveals how the incorrect implementation of the Autodiscover protocol, rather than a bug in Microsoft Exchange,  is causing Windows credentials to be sent to third-party untrusted websites.

Before we get to the meat of the issue, it is important to take a quick look at Microsoft Exchange’s Autodiscover protocol and how it’s implemented.

What is Microsoft Exchange Autodiscover

Microsoft Exchange uses an Autodiscover feature to automatically configure a user’s mail client, such as Microsoft Outlook, with their organization’s predefined mail settings.

When an Exchange user enters their email address and password into an email client, such as Microsoft Outlook, the mail client then attempts to authenticate to various Exchange Autodiscover URLs.

During this authentication process, the login name and password are sent automatically to the Autodiscover URL.

Microsoft Outlook trying to configure account using Autodiscover
Microsoft Outlook trying to configure account using Autodiscover
Source: Guardicore

The Autodiscover URLs that will be connected to are derived from the email address configured in the client.

Also Read: How Formidable is Singapore Cybersecurity Masterplan 2020?

For example, when Serper tested the Autodiscover feature using the email ‘[email protected]’, he found that the mail client tried to authenticate to the following Autodiscover URLs:

  • https://Autodiscover.example.com/Autodiscover/Autodiscover.xml
  • http://Autodiscover.example.com/Autodiscover/Autodiscover.xml
  • https://example.com/Autodiscover/Autodiscover.xml
  • http://example.com/Autodiscover/Autodiscover.xml

The mail client would try each URL until it was successfully authenticated to the Microsoft Exchange server and configuration information was sent back to the client.

Leaking credentials to external domains

If the client could not authenticate to the above URLs, Serper found that some mail clients, including Microsoft Outlook, would perform a “back-off” procedure. This procedure attempts to create additional URLs to authenticate to, such as the autodiscover.[tld] domain, where the TLD is derived from the user’s email address.

In this particular case, the URL generated is http://Autodiscover.com/Autodiscover/Autodiscover.xml.

This incorrect implementation of the Autodiscover protocol is causing mail clients to authenticate to untrusted domains, such as autodiscover.com, which is where the trouble begins.

As the email user’s organization does not own this domain, and credentials are automatically sent to the URL, it would allow the domain owner to collect any credentials sent to them.

To test this, Guardicore registered the following domains and set up web servers on each to see how many credentials would be leaked by the Microsoft Exchange Autodiscover feature.

  • Autodiscover.com.br – Brazil
  • Autodiscover.com.cn – China
  • Autodiscover.com.co – Columbia
  • Autodiscover.es – Spain
  • Autodiscover.fr – France
  • Autodiscover.in – India
  • Autodiscover.it – Italy
  • Autodiscover.sg – Singapore
  • Autodiscover.uk – United Kingdom
  • Autodiscover.xyz
  • Autodiscover.online

After these domains were registered and used, Serper found that email clients, including Microsoft Outlook, sent many account credentials using Basic authentications, making them easily viewable.

Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

Email client connecting to an autodiscover.xyz URL
Email client connecting to an autodiscover.xyz URL
Source: Guardicore

For Microsoft Outlook clients that sent credentials using NTLM and Oauth, Serper created an attack dubbed “The ol’ switcheroo” that would force the client to downgrade the request to a Basic authentication request.

This would once again allow the researcher to access the cleartext passwords for the user.

Attack forcing the client to downgrade to Basic authentication
Attack forcing the client to downgrade to Basic authentication
Source: Guardicore

When conducting these tests between April 20th, 2021, and August 25th, 2021, Guardicore servers received a:

  • 648,976 HTTP requests targeting their Autodiscover domains.
  • 372,072 Basic authentication requests.
  • 96,671 unique pre-authenticated requests.

Guardicore says the domains that sent their credentials include:

  • Publicly traded companies in the Chinese market
  • Food manufacturers
  • Investment banks
  • Power plants
  • Power delivery
  • Real estate
  • Shipping and logistics
  • Fashion and Jewelry

Mitigating the Microsoft Exchange Autodiscover leaks

Serper has provided a few suggestions that organizations and developers can use to mitigate these Microsoft Exchange Autodiscover leaks.

For organizations using Microsoft Exchange, you should block all Autodiscover.[tld] domains at your firewall or DNS server so that your devices cannot connect to them. Guardicore has created a text file containing all Autodiscover domains that can be used to create access rules.

Organizations are also recommended to disable Basic authentication, as it essentially sends credentials in cleartext.

For software developers, Serper recommends users prevent their mail clients from failing upwards when constructing Autodiscover URLs so that they never connect to Autodiscover.[tld] domains.

Why developers, including Microsoft, are falling back to untrusted autodiscover.[tld] domains remain a mystery, as Microsoft’s documentation on the Autodiscover protocol makes no mention of these domains.

“Many developers are just using third party libraries that all have the same problem. I’m willing to bet that the vast majority of developerss aren’t even aware of it,” Serper told BleepingComputer.

Update 9/22/21: After reaching out to Microsoft about the bug, we were provided the following statement:

“We are actively investigating and will take appropriate steps to protect customers. We are committed to coordinated vulnerability disclosure, an industry standard, collaborative approach that reduces unnecessary risk for customers before issues are made public. Unfortunately, this issue was not reported to us before the researcher marketing team presented it to the media, so we learned of the claims today.” Jeff Jones, Sr. Director, Microsoft.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us