You are here

HAFNIUM: Exchange RCE

IDs: 
CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065
Keywords: 
exchange, HAFNIUM, cookie store
Description: 

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks [1]. The vulnerabilities are critical and could lead to remote code execution (RCE).

Attackers can send malicious cookies like "X-AnonResource-Backend" and " X-BEResource" to trigger the attack. Airlock Gateway implements a cookie store and does not expose any application cookies to the client/attacker by default*. Attackers are therefore not able to tamper with cookies or send unknown cookies to the back-end.

Due to this, Airlock Gateway mitigates the risk of exploitation.

*The Airlock Gateway Exchange/OWA templates do not define the affected cookies as passthrough. If you have modified the templates, please check this setting in the basic tab of the corresponding Mappings.

Resolution: 

Microsoft provides patches [2]. We recommend to update any vulnerable Exchange system asap to fix the root causes of the vulnerabilities.

Component: 
Airlock
Airlock Vulnerability Status: 
No action required
Back-end Vulnerability Status: 
Back-ends may be vulnerable, see resolution