Uncategorized

BSI warns companies to plug the security gaps quickly


No time right now?

“Immediate action necessary” is the subtitle of the BSI’s warning about the recently discovered vulnerabilities in Exchange servers. Patches are available, but you have to install them yourself.

On Wednesday, Microsoft closed four vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065) in its Exchange Server email software. They are said to have been exploited by alleged Chinese hackers. In Germany alone, according to the Federal Office for Information Security (BSI), “tens of thousands of Exchange servers” are said to have been vulnerable to attack via the Internet and “with a high degree of probability” have already been infected. The BSI therefore calls on companies to act immediately – even over the weekend.

BSI contacts thousands of companies

According to its own statements, the authority contacted more than 9,000 companies on Friday – but “in a postal letter directly to the management board”. The letter also includes recommendations for countermeasures. The BSI has the corresponding information and measures on the weak points in the Exchange servers on this page collected.

The BSI recommends that operators of affected Exchange servers (according to Microsoft, Exchange server versions 2013, 2016 and 2019) should immediately import the patches provided by Microsoft. In addition, the systems should urgently be checked for any abnormalities. Especially companies that did not patch immediately on Wednesday should be on their guard here.

Almost finished!

Please click on the link in the confirmation email to complete your registration.

Would you like more information about the newsletter? Find out more now

SME IT with many unpatched vulnerabilities

For the BSI, an additional complication is that thousands of systems still had weak points that have been known for over a year – and have not yet been patched. According to the IT security experts, this could particularly affect small and medium-sized companies. The problem: attackers can exploit the security gaps in the Exchange servers remotely via the Internet and thus access the company’s e-mail communication.

In addition, it is also possible to gain access to the entire company network via vulnerable server systems. According to the BSI, this is also due to the fact that Exchange servers have high rights in Active Directory in many infrastructures by default. Because so-called proof-of-concept exploit codes are available to hackers around the world and security researchers notice strong scanning activities, the BSI currently assumes a very high risk of attack.

Most read

Leave a Reply

Your email address will not be published. Required fields are marked *