As part of our 24×7 threat intelligence activities, our experts have noted a critical vulnerability compromising the 3CX desktop app.
CVE-2024-21410 – CVSS Score 9.8 – Critical
This is a security threat advisory impacting Microsoft Exchange servers. The vulnerability (CVE-2024-21410) is rated as Critical (CVSS 9.8) and allows a remote attacker to relay leaked credentials against an email client to gain privileges to act as an authorised user.
Affected vendors: Microsoft
Affected resource: Exchange servers 2016 & Exchange Servers 2019
The vulnerability impacts the following versions of Exchange Server where Windows Extended Protection is not enabled:
For Exchange Server 2019, Windows Extended Protection is enabled by default from Cumulative Update 14 or later (version 15.2.1544.04 or greater).
For Exchange Server 2016, Windows Extended Protection is available from Cumulative Update 23 or later (version 15.1.2507.6 or greater), however is NOT enabled by default. It can be enabled using the ExchangeExtendedProtectionManagement.ps1 script from Microsoft as described below:
Exchange Server support for Windows Extended Protection | Microsoft Learn
We recommend that you take the following steps to confirm if you are exposed to this vulnerability.
Update vulnerable servers to Exchange Server 2019 Cumulative Update 14 or higher.
Exchange Server build numbers and release dates | Microsoft Learn
Windows Extended Protection will be enabled by default but you can confirm the presence of this setting by using the advice above to run the Exchange HealthChecker script.
Update vulnerable servers to Exchange Server 2016 Cumulative Update 23 and security update if not on this version already
Then enable Windows Extended Protection by running the ExchangeExtendedProtectionManagement.ps1 script from Exchange Server support for Windows Extended Protection | Microsoft Learn
If you require any assistance, please do not hesitate to get in contact.