{"id":48,"date":"2021-11-11T21:00:44","date_gmt":"2021-11-11T21:00:44","guid":{"rendered":"https:\/\/www.bearlysecure.org\/V1\/?p=48"},"modified":"2021-11-11T21:00:44","modified_gmt":"2021-11-11T21:00:44","slug":"48-2","status":"publish","type":"post","link":"https:\/\/www.bearlysecure.org\/V1\/48-2\/","title":{"rendered":""},"content":{"rendered":"<div class=\"boldgrid-section\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-sm-12 boldgrid-section\"><strong>Important Note:<\/strong> This detection also relies on application logging being enabled on Exchange Servers.<\/p>\n<table id=\"mainTable\" class=\"container mob-full mktoContainer\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr id=\"copy3ad0e956-9045-4359-bed8-491c18864a2455bc758f-bd76-4e3b-ac92-d11e59d5589d6d50a693-2c30-4293-b1dd-4b433b79c88e2d625a36-5da6-4100-b4d4-b02c27d041a2\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit3ad0e956-9045-4359-bed8-491c18864a2455bc758f-bd76-4e3b-ac92-d11e59d5589d6d50a693-2c30-4293-b1dd-4b433b79c88e2d625a36-5da6-4100-b4d4-b02c27d041a2\" data-ogsc=\"rgb(0, 0, 0)\">On Tuesday, November 9, 2021, Microsoft released patches for two actively exploited vulnerabilities, CVE-2021-42321 in Microsoft Exchange, and CVE-2021-42292 in Microsoft Excel.<\/p>\n<p>CVE-2021-42321 is a post-authentication remote code execution vulnerability in Microsoft Exchange Server 2016 and 2019. This specifically affects on-premises Microsoft Exchange Server and Exchange servers deployed in a hybrid model. Exchange online customers are not vulnerable.<\/p>\n<p>CVE-2021-42292 is a security bypass vulnerability in Microsoft Excel that could lead to local code execution via a specially crafted Excel file. Updates for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are currently not available.<\/p>\n<p>Microsoft has reported limited exploitation of these two vulnerabilities and have not released technical details regarding how these vulnerabilities work or which threat actors or campaigns are exploiting them. Public proof of concept exploit code for both vulnerabilities is not available at this time.<\/p>\n<p>We <strong>strongly recommend<\/strong> that customers running vulnerable versions of Microsoft Excel and Microsoft Exchange Server review the recommendations below and apply the latest security patches immediately.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"divider-a5d80459e-7a7c-4cce-997b-9d06968de56f\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div data-ogsb=\"rgb(217, 217, 217)\">&nbsp;<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"headline-h228f64092-bf8d-4ee9-83c7-fc11fb7dcb5b41a289de-e099-4735-b53a-f31897a3c7ab5a3d4f98-1e60-4563-9ecd-29e43c85ea311cc3866d-3ce2-4573-b5f6-9b250d9c3b02\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"headline-h2.edit28f64092-bf8d-4ee9-83c7-fc11fb7dcb5b41a289de-e099-4735-b53a-f31897a3c7ab5a3d4f98-1e60-4563-9ecd-29e43c85ea311cc3866d-3ce2-4573-b5f6-9b250d9c3b02\">Recommendations<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copy58e612b6-4957-41cf-bc45-4b5ed8c6fcd8\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit24e1ab51-4afc-469f-a11c-d1dc03d2934d\" data-ogsc=\"rgb(0, 0, 0)\">This section details recommendations that we suggests to remediate CVE-2021-42321 and CVE-2021-42292 and provide increased visibility into potential attack activity on Windows systems running Microsoft Exchange Server.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"headline-h4007af01c-d863-4e6c-89a8-9f596a8ab8ca\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"headline-h4.edit007af01c-d863-4e6c-89a8-9f596a8ab8ca\" data-ogsc=\"rgb(112, 127, 134)\">Recommendation #1: Patch Vulnerable Versions of Microsoft Exchange Server to Remediate CVE-2021-42321<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copy0452a1aa-5348-4589-ba27-dbdb23061e30\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.editf25d1931-2ec5-498e-b2ea-38e944354458\" data-ogsc=\"rgb(0, 0, 0)\">Our primary recommendation for remediating CVE-2021-42321 is to patch vulnerable versions of Microsoft Exchange Server.<\/p>\n<p>Microsoft has indicated in their advisory <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZiiVW7CYcWmhKutunQrU4gQE6cmwbVNEafPQoWWNx0TetEaGMWPoX_cn42ZNDXEdtXWk=\">here<\/a> that specific versions are affected by this vulnerability. We recommend reviewing the table below to determine if you are running any outdated versions of this software in your environment and patch as soon as possible.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copyf628c870-2059-4542-8fc8-be77509ce7de\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit06016dec-a655-49bf-9943-30084f67ac1e\" data-ogsc=\"rgb(0, 0, 0)\">\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"10\" data-ogsc=\"black\">\n<tbody>\n<tr>\n<td><strong>Product<\/strong><\/td>\n<td><strong>Microsoft Security Update Page<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server 2019<\/td>\n<td>Cumulative Update 11: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi_ZMHyEHdHGfJDR9hmZoVVkC566_doQQ_LerOJNWu79KOB_oli_47aB4OM8tVlOse0o=\">Security Update For Exchange Server 2019 CU11 (KB5007409)<\/a><br \/>\nCumulative Update 10: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi9J9pO-8_dyeP3aesk7uF2VE5kLbESA_8aUB4yz0aVU72_B1Re-DjDZNTXWJ0mic9cA=\">Security Update For Exchange Server 2019 CU10 (KB5007409)<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server 2016<\/td>\n<td>Cumulative Update 22: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi4CxpvheRLajE_EtRfgdnWsrjfWzRCAW7VENXYUcQftw-CsNuShP55HuZz7Mbc2SckA=\">Security Update For Exchange Server 2016 CU22 (KB5007409)<\/a><br \/>\nCumulative Update 21: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZiq-uBHLZRBPcXRqCmQEQnd5O1Hd5PGE6pvfGdTl3mUiOlo1NW7IL1SVfvmHS4sQoJ2k=\">Security Update For Exchange Server 2016 CU21 (KB5007409)<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copy3ad0e956-9045-4359-bed8-491c18864a2455bc758f-bd76-4e3b-ac92-d11e59d5589dea1003d6-679c-44d2-a084-4bf77ec2c724247e4f4d-4568-4673-a700-4ea866546246f6f90e9c-d7e8-4c4f-9e15-cf8c743e78a5061f53b9-7e9a-40bc-8a68-66b7f1bf4315\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit3ad0e956-9045-4359-bed8-491c18864a2455bc758f-bd76-4e3b-ac92-d11e59d5589dea1003d6-679c-44d2-a084-4bf77ec2c724247e4f4d-4568-4673-a700-4ea866546246f6f90e9c-d7e8-4c4f-9e15-cf8c743e78a5061f53b9-7e9a-40bc-8a68-66b7f1bf4315\" data-ogsc=\"rgb(0, 0, 0)\"><strong>NOTE:<\/strong> Microsoft has not indicated that CVE-2021-42321 impacts Microsoft Exchange Server 2013.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"headline-h43158f40e-5b2f-4d3d-87ae-4682f65e7546\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"headline-h4.edit3158f40e-5b2f-4d3d-87ae-4682f65e7546\" data-ogsc=\"rgb(112, 127, 134)\">Recommendation #2: Patch Vulnerable Versions of Microsoft Excel to Remediate CVE-2021-42292<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copyf1323013-9a65-47f9-bb23-7f7fa433eaed\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit2e073102-e9d2-4227-9a2f-fa3f4d6c000d\" data-ogsc=\"rgb(0, 0, 0)\">Our primary recommendation for remediating CVE-2021-42292 is to patch vulnerable versions of Microsoft Excel.<\/p>\n<p>Microsoft has indicated in their advisory <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi8LIeAyIN4vRbpZxEqFo6k2yFAhdkRzI_29mDMv-9UOum0pBcdqXqlt9IaRAdArCXdw=\">here<\/a> that specific versions are affected by this vulnerability. We recommend reviewing the table below to determine if you are running any outdated versions of this software in your environment and apply patches as soon as possible.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copyefd2d448-25d4-4b0e-bc22-aa3f23f612ab\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.editc7ddd344-22e6-443e-93e8-2ed9404614f3\" data-ogsc=\"rgb(0, 0, 0)\">\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"10\" data-ogsc=\"black\">\n<tbody>\n<tr>\n<td><strong>Product<\/strong><\/td>\n<td><strong>Microsoft Security Update Page<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office 2013 Service Pack 1 (32-bit &amp; 64-bit)<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZizyqt_1qDaPOThUqUsxpk8RwD6OpzDjjF1hlR0PvGn2kIlGapH5U-cb29XJvzSZdulI=\">https:\/\/support.microsoft.com\/help\/5002035<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Excel 2013 RT Service Pack 1<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZizyqt_1qDaPOThUqUsxpk8RwD6OpzDjjF1hlR0PvGn2kIlGapH5U-cb29XJvzSZdulI=\">https:\/\/support.microsoft.com\/help\/5002035<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Excel 2013 Service Pack 1 (64-bit editions)<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZizyqt_1qDaPOThUqUsxpk8RwD6OpzDjjF1hlR0PvGn2kIlGapH5U-cb29XJvzSZdulI=\">https:\/\/support.microsoft.com\/help\/5002035<\/a><br \/>\n<a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi8_V8Jhj0AzA2y2p6qsrvcmFsTQitnHKn_lx_3635KVoOemHpft1wOHhIKFSUk1YyoY=\">https:\/\/support.microsoft.com\/help\/5002072<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office 2016 (32-bit &amp; 64-bit)<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZihLTkff2NhVR9XwjT6kpYOS2hntaTVE4_0cKwxHBDnRt990LHaB65nlu_ucydbRpimw=\">https:\/\/support.microsoft.com\/help\/4486670<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Excel 2016 (64-bit &amp; 32-bit)<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi6cXsOTZY_iY_a8yLtD9Ny7Vw5R2c3cDgToFUJEfmYVcZMwOhblticix25FyJOE0EpU=\">https:\/\/support.microsoft.com\/help\/5002056<\/a><br \/>\n<a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZihLTkff2NhVR9XwjT6kpYOS2hntaTVE4_0cKwxHBDnRt990LHaB65nlu_ucydbRpimw=\">https:\/\/support.microsoft.com\/help\/4486670<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office LTSC 2021 for 32-bit &amp; 64-bit<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZiivo53IksZ5w_99_IXijFF1KnezZRM7TmaJhU-RpCsdaHEI4GNpaOQiJoRlGUtL9vEo=\">https:\/\/docs.microsoft.com\/en-us\/officeupdates\/microsoft365-apps-security-updates<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft 365 Apps for Enterprise for 32-bit &amp; 64-bit<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZiya_CjNFzFcPIkmmu-f3EjJq9BTH1oDRWBVvc6GQnhyVb4i5om25GythPGYODlSadrw=\">https:\/\/docs.microsoft.com\/en-us\/officeupdates\/office365-proplus-security-updates<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office 2019 for 32-bit &amp; 64-bit<\/td>\n<td><a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZiivo53IksZ5w_99_IXijFF1KnezZRM7TmaJhU-RpCsdaHEI4GNpaOQiJoRlGUtL9vEo=\">https:\/\/docs.microsoft.com\/en-us\/officeupdates\/microsoft365-apps-security-updates<\/a><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office LTSC for Mac 2021<\/td>\n<td>Not Available from Microsoft at this time<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office 2019 for Mac<\/td>\n<td>Not Available from Microsoft at this time<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"headline-h48fdfc722-100d-4d81-9c8f-1a3320095e36\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"headline-h4.edit8d5b168e-9a3c-4fd6-9c3d-332b5849d404\" data-ogsc=\"rgb(112, 127, 134)\">Recommendation #3: Run Microsoft Supplied PowerShell Command on All Exchange 2016 and 2019 Servers<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copyd0eaa100-ee56-4d92-912d-05cbdb0f323d\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit5c8bff69-8fcd-4c2f-a309-31146795098e\" data-ogsc=\"rgb(0, 0, 0)\">Microsoft has provided a PowerShell query in their blog <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi1XX3Epi5QP9_CM7-qqm0r5laSiD5r0TLZEZoUsNtpSjN1rcqJKOKp94beulOxz_784=\">here<\/a> that can be run directly on Exchange 2016 and 2019 Servers to identify potential prior exploitation activity associated with CVE-2021-42321.<\/p>\n<p>To run this check, perform the following PowerShell query:<\/p>\n<p><span data-ogsb=\"rgb(227, 225, 225)\">Get-EventLog -LogName Application -Source &#8220;MSExchange Common&#8221; -EntryType Error | Where-Object { $_.Message -like &#8220;*BinaryFormatter.Deserialize*&#8221; } <\/span><\/p>\n<p>If matches are found, you know further investigation is required.&nbsp;<\/p><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"headline-h422b12153-c58b-4ef9-ae0c-09b0fb641e32\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copy21956d3d-4fe0-4e5d-9119-06ae98104785\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"divider-aa8cba8de-1912-440a-84c4-e75114abde57\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div data-ogsb=\"rgb(217, 217, 217)\">&nbsp;<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"headline-h228f64092-bf8d-4ee9-83c7-fc11fb7dcb5b41a289de-e099-4735-b53a-f31897a3c7ab5a3d4f98-1e60-4563-9ecd-29e43c85ea311cc3866d-3ce2-4573-b5f6-9b250d9c3b02a2e1bb7a-3073-418b-8b0b-b2b1503446eb\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"headline-h2.edit28f64092-bf8d-4ee9-83c7-fc11fb7dcb5b41a289de-e099-4735-b53a-f31897a3c7ab5a3d4f98-1e60-4563-9ecd-29e43c85ea311cc3866d-3ce2-4573-b5f6-9b250d9c3b02a2e1bb7a-3073-418b-8b0b-b2b1503446eb\">References<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copy3ad0e956-9045-4359-bed8-491c18864a2455bc758f-bd76-4e3b-ac92-d11e59d5589dea1003d6-679c-44d2-a084-4bf77ec2c724247e4f4d-4568-4673-a700-4ea866546246f6f90e9c-d7e8-4c4f-9e15-cf8c743e78a5061f53b9-7e9a-40bc-8a68-66b7f1bf43156801c517-207b-4f92-98b8-b94304d2ef89\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit3ad0e956-9045-4359-bed8-491c18864a2455bc758f-bd76-4e3b-ac92-d11e59d5589dea1003d6-679c-44d2-a084-4bf77ec2c724247e4f4d-4568-4673-a700-4ea866546246f6f90e9c-d7e8-4c4f-9e15-cf8c743e78a5061f53b9-7e9a-40bc-8a68-66b7f1bf43156801c517-207b-4f92-98b8-b94304d2ef89\" data-ogsc=\"rgb(0, 0, 0)\">\n<ol>\n<li>November 9, 2021 Security Updates for Microsoft Exchange: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi3itRY8QIExhVW8OdP8fjnFl6c7CSPKDKZWkgn5Jox6uXa8doC5DprYtIcF92VfCXQE=\">https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-november-9-2021-kb5007409-7e1f235a-d41b-4a76-bcc4-3db90cd161e7<\/a><\/li>\n<li>Microsoft Blog on Exchange Security Updates: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi1XX3Epi5QP9_CM7-qqm0r5laSiD5r0TLZEZoUsNtpSjN1rcqJKOKp94beulOxz_784=\">https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-november-2021-exchange-server-security-updates\/ba-p\/2933169<\/a><\/li>\n<li>Microsoft CVE-2021-42321 Advisory: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZiiVW7CYcWmhKutunQrU4gQE6cmwbVNEafPQoWWNx0TetEaGMWPoX_cn42ZNDXEdtXWk=\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-42321<\/a><\/li>\n<li>Microsoft CVE-2021-42292 Advisory: <a id=\"\" href=\"https:\/\/go.arcticwolf.com\/ODQwLU9TUS02NjEAAAGAqmjZi8LIeAyIN4vRbpZxEqFo6k2yFAhdkRzI_29mDMv-9UOum0pBcdqXqlt9IaRAdArCXdw=\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-42292<\/a><\/li>\n<\/ol>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr id=\"copy899213b9-b242-4d31-bec5-3013e27142619263dd6a-a967-4991-bf9a-f249f2faaab3\" class=\"mktoModule\">\n<td data-ogsb=\"rgb(255, 255, 255)\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div class=\"mktoText\" id=\"copy.edit899213b9-b242-4d31-bec5-3013e27142619263dd6a-a967-4991-bf9a-f249f2faaab3\" data-ogsc=\"rgb(0, 0, 0)\">If you have any additional questions, please reach out to you<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Important Note: This detection also relies on application logging being enabled on Exchange Servers. On Tuesday, November 9, 2021, Microsoft released patches for two actively exploited vulnerabilities, CVE-2021-42321 in Microsoft Exchange, and CVE-2021-42292 in Microsoft Excel. CVE-2021-42321 is a post-authentication remote code execution vulnerability in Microsoft Exchange Server 2016 and 2019. This specifically affects on-premises&hellip;&nbsp;<a href=\"https:\/\/www.bearlysecure.org\/V1\/48-2\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\"><\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"bgseo_title":"","bgseo_description":"","bgseo_robots_index":"index","bgseo_robots_follow":"follow","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-48","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/posts\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/comments?post=48"}],"version-history":[{"count":1,"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/posts\/48\/revisions"}],"predecessor-version":[{"id":49,"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/posts\/48\/revisions\/49"}],"wp:attachment":[{"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/media?parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/categories?post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bearlysecure.org\/V1\/wp-json\/wp\/v2\/tags?post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}