<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>MachPanel Automation Archives - MachSol Blog</title>
	<atom:link href="https://blog.machsol.com/tag/machpanel-automation/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.machsol.com/tag/machpanel-automation</link>
	<description>Multi-Cloud Service Orchestration &#38; Delivery Platform</description>
	<lastBuildDate>Thu, 06 Oct 2022 19:01:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Mitigate Zero-Day Vulnerabilities in Microsoft Exchange Server with MachPanel</title>
		<link>https://blog.machsol.com/cloud/mitigate-zero-day-vulnerabilities-in-microsoft-exchange-server-with-machpanel</link>
		
		<dc:creator><![CDATA[Jameel]]></dc:creator>
		<pubDate>Thu, 06 Oct 2022 18:59:05 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[MachPanel Control Server]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[Microsoft Exchange]]></category>
		<category><![CDATA[Exchange Server]]></category>
		<category><![CDATA[MachPanel Automation]]></category>
		<category><![CDATA[Mitigate Zero-Day Vulnerabilities]]></category>
		<guid isPermaLink="false">https://blog.machsol.com/?p=5547</guid>

					<description><![CDATA[<p>While limited targeted attacks are being reported on Microsoft Exchange servers, Microsoft is already aware and investigating two reported zero-day vulnerabilities affecting mainly on-premises Microsoft Exchange Servers including Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019. The two vulnerabilities reported are: CVE-2022-41040: Server-Side Request Forgery (SSRF) vulnerability CVE-2022-41082: Allows Remote Code Execution (RCE) [&#8230;]</p>
<p>The post <a href="https://blog.machsol.com/cloud/mitigate-zero-day-vulnerabilities-in-microsoft-exchange-server-with-machpanel">Mitigate Zero-Day Vulnerabilities in Microsoft Exchange Server with MachPanel</a> appeared first on <a href="https://blog.machsol.com">MachSol Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="size-full wp-image-5553" src="https://blog.machsol.com/wp-content/uploads/secure-exchange.jpg" alt="" width="853" height="480" srcset="https://blog.machsol.com/wp-content/uploads/secure-exchange.jpg 853w, https://blog.machsol.com/wp-content/uploads/secure-exchange-350x197.jpg 350w, https://blog.machsol.com/wp-content/uploads/secure-exchange-768x432.jpg 768w, https://blog.machsol.com/wp-content/uploads/secure-exchange-720x405.jpg 720w, https://blog.machsol.com/wp-content/uploads/secure-exchange-580x326.jpg 580w, https://blog.machsol.com/wp-content/uploads/secure-exchange-320x180.jpg 320w" sizes="(max-width: 853px) 100vw, 853px" /></p>
<p>While limited targeted attacks are being reported on Microsoft Exchange servers, Microsoft is already aware and investigating two reported zero-day vulnerabilities affecting mainly on-premises Microsoft Exchange Servers including Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019. The two vulnerabilities reported are:</p>
<ul>
<li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41040">CVE-2022-41040</a>: Server-Side Request Forgery (SSRF) vulnerability</li>
<li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41082">CVE-2022-41082</a>: Allows Remote Code Execution (RCE) when PowerShell is accessible to the attacker.</li>
</ul>
<p><strong>Are you already affected with Zero-Day Vulnerabilities in Microsoft Exchange Server?</strong></p>
<p>As a first step you immediately have to verify if you are already affected or not and you can do that through below PowerShell command:</p>
<p><span style="color: #ff6600;">Get-ChildItem -Recurse -Path C:\inetpub\logs\LogFiles -Filter &#8220;*.log&#8221; | Select-String -Pattern &#8216;powershell.*autodiscover\.json.*\@.*200&#8217;</span></p>
<p>MachSol recommends that customers already using On-premise Exchange should follow <a href="https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/">Microsoft recommendations</a>. In addition, MachPanel: MachSols leading automation solution for Enterprises, Governments and Cloud Service Providers for Multi-Cloud service delivery immediately responded to reported vulnerability and issued a <a href="https://kb.machsol.com/Knowledgebase/55717/Hotfix-for-Exchange-Zero-Day-Vulnerabilities">hotfix</a> to mitigate the threat. All existing customers of MachPanel can simply apply the hotfix which will disable the Remote PowerShell for all new Users and for existing users, they simply have to trigger Security permissions to disable the Remote PowerShell.</p>
<p><strong>How Hosted Exchange service providers can stay Secure:</strong></p>
<p>With the rising Cyber-attacks, it is very important for all Exchange On-premise admins to ensure you have your infrastructure updated to latest security patches and releases and on top of that stay connected with Microsoft security response center updates specially <a href="https://www.microsoft.com/security/blog/2022/09/30/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082/">Microsoft Security blog</a>.</p>
<p><strong>Effects of Zero-Day attacks on Microsoft Exchange On-premise market and importance of a reliable Service Delivery Partner:</strong></p>
<p>It is important to note that Microsoft online services are not affected by latest vulnerabilities and while on-premise market is already facing an uphill challenge to compete Microsoft, such attacks will further hamper their effort to stay in the competition. But if you have a service delivery partner with an up-to-date solution and takes all necessary actions to immediately respond to such threats, then you are always on a secure side. MachPanel is industry leading Cloud automation solution that has been servicing Enterprises, Cloud service providers and Governments for decades and ensure you are able to offer your hosted services securely.</p>
<p><strong>Offer Multi-tenant -Secure- Reliable Exchange offerings with MachPanel Automation Module for Exchange:</strong><br />
<strong><br />
</strong>MachPanel helps you offer fully Multi-tenant Exchange offerings and automates your complete business life cycle with all the necessary business components. To explore further: <a href="https://www.machsol.com/machpanel-automation-for-microsoft-exchange/">https://www.machsol.com/machpanel-automation-for-microsoft-exchange/</a></p>
<p>The post <a href="https://blog.machsol.com/cloud/mitigate-zero-day-vulnerabilities-in-microsoft-exchange-server-with-machpanel">Mitigate Zero-Day Vulnerabilities in Microsoft Exchange Server with MachPanel</a> appeared first on <a href="https://blog.machsol.com">MachSol Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
