Powered by MOMENTUM MEDIA
Powered by MOMENTUM MEDIA

Website Notifications

Get notifications in real-time for staying up to date with content that matters to you.

Organisations fail to patch Microsoft Exchange vulnerabilities

The Commonwealth has urged organisations to upgrade their cyber infrastructure, with many failing to adequately respond to recent cyber attacks.

The Commonwealth has urged organisations to upgrade their cyber infrastructure, with many failing to adequately respond to recent cyber attacks.

Earlier this month, the Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) identified “extensive targeting” and compromises of Australian organisations with vulnerable Microsoft Exchange networks. 

The ACSC noted that while it is assisting affected organisations with their incident response and remediation, a number of stakeholders are yet to address the issue.

Organisations were urged to patch the following common vulnerabilities and exposures (CVEs):

  • CVE-2021-26855 - server-side request forgery (SSRF) vulnerability in Exchange;
  • CVE-2021-26857 - insecure deserialisation vulnerability in the Unified Messaging service;
  • CVE-2021-26858 - post-authentication arbitrary file write vulnerability in Exchange; and
  • CVE-2021-27065 - post-authentication arbitrary file write vulnerability in Exchange.

However, in a statement released on Thursday (25 March), the federal government revealed that many businesses failed to install the patches.

Assistant Minister for Defence Andrew Hastie urged entities to implement appropriate safeguards and shore-up their defences against future threats.

“The Morrison government’s first priority is to keep Australians safe, including when online, and it is vital that small businesses and organisations take the necessary steps to protect themselves from this vulnerability,” Assistant Minister Hastie said.

“My first priority is to keep Australians safe in both the physical world and online, and to do this I need everyone to listen to these warnings, and follow the advice of the ACSC and strengthen our cyber defences.

“If you use Microsoft Exchange it is critical that you move fast to shut this potential threat down.”

 

Organisations fail to patch Microsoft Exchange vulnerabilities
breaking-the-cyber-cycle.jpg.jpg
lawyersweekly logo

more from cyber security connect

Apr 22 2021
acthTIS announces new ventures in EMEA market
The ASX-listed cyber security company has secured new deals in Europe, the Middle East and Africa. ...
Daniel Harding
Apr 22 2021
Op-Ed: Is your contact centre a weak link in your cyber security chain?
It’s Privacy Awareness Week in early May – an opportune time to make sure your contact centre is...
Apr 22 2021
Op-Ed: Keep your application’s secrets protected
The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeli...
FROM THE WEB
Recommended by Spike Native Network