Hackers are exploiting critical vulnerability in Microsoft Exchange server

Hackers are exploiting critical vulnerability in Microsoft Exchange server

Microsoft has over 1.2 billion users worldwide and that makes it a lucrative target for cyber criminals.


Volexity, a US-based cybersecurity firm has revealed that some state-sponsored hackers are trying to exploit a vulnerability in Microsoft Exchange email servers, which Microsoft already patched in February.


Classified as CVE-2020-0688; the vulnerability is exploited by state-backed APT (advanced persistent threat) hacking groups. 


See: 250 million Microsoft customer support records leaked in plain text


The vulnerability was identified by an unnamed security researcher, and Microsoft was informed through the Zero Day Initiative by Trend Micro. The cybersecurity firm claims that more than one threat actors are involved in the exploitation of the Exchange server.

After Microsoft released security updates, a blog post was published by the Zero Day Initiative, around two weeks later. The post revealed in-depth details about the vulnerability, clearly stating that attackers can exploit the Exchange server only,



“If the Exchange Server had not been patched since February 11, 2020; The Exchange Control Panel (ECP) interface was accessible to the attacker and the attacker has a working credential that allows them to access the Exchange Control Panel in order to collect the ViewState Key.”


According to Volexity’s
Support the originator by clicking the read the rest link below.