Greetings Everyone,
The Emerging Threats team is aware of the recent zero-day vulnerabilities revealed for Microsoft Exchange and Microsoft OWA services – also known as CVE-2022-41040, CVE-2022-41082, and collectively as “ProxyNotShell”.
At this time, a public proof of concept has not yet been discovered, however several organizations are claiming that these newly discovered vulnerabilities are almost identical in nature to the ProxyShell vulnerabilities discovered last year (CVEs 2021-34473, 2021-34523, and 2021-31207)in that the newly discovered vulnerabilities exploit an SSRF vulnerability to trigger remote code execution.
The primary difference between 2021’s ProxyShell, and this new ProxyNotShell is that the new vulnerability requires valid credentials for an exchange user on the on-prem Exchange/OWA deployment in order to trigger the exploit successfully. Last year, we developed Suricata and Snort sids 2033684, 2033711, 2033712, 2035649, and 2035650 to detect exploit attempts of the ProxyShell vulnerability chain. However with scant details on how this new ProxyNotShell vulnerability is triggered, and how that differs from the previous vulnerability, we have been prompted to create a new signature based on information presented by Microsoft MSRC. While the guidance is scant on specific details for ProxyNotShell, MSRC mentions a mitigation method that involves blocking access to a specific URI pattern:
.*autodiscover\.json.*\@.*Powershell.*
Again, this URI pattern is almost identical to the URI pattern used to trigger ProxyShell, and our existing rules account for this. However, our existing rules also assume the existence of an Email=
parameter as well as the X-Rps-CAT
parameter – in either the http URI or the http cookie fields of the HTTP header. It is not yet known whether or not these parameters are required to be present to trigger this new vulnerability, so in an abundance of caution we have created a new, more generic rule that triggers on the URI pattern that microsoft has specified, without any additional parameters. This rule will be released this evening (2022/09/30) EST as a part of our daily rule release into the ETOPEN and ETPRO rulesets.
If you would like to know more about ProxyNotShell, including host-based detection methods, mitigations, and the campaign by which this new vulnerability was discovered, please consult the following links:
We would like to thank Kevin Beaumont (@GossiTheDog) for his detailed coverage of these new vulnerabilities, Gteltsc for their write-up, and MSRC for their advisory.