Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Microsoft Exchange Flaw Actively Exploited

February 20, 2024
Reading Time: 3 mins read
in Alerts

Hackers are exploiting a critical flaw, CVE-2024-21410, in Microsoft Exchange servers, potentially putting up to 97,000 systems at risk. Despite Microsoft addressing the issue on February 13, after it was already leveraged as a zero-day exploit, thousands of vulnerable servers have been identified. This flaw allows remote unauthenticated actors to conduct NTLM relay attacks, enabling them to escalate their privileges on the system. As a result, essential communication services provided by Exchange Server, crucial for business environments, are compromised, posing serious risks to data security and integrity.

The widespread use of Microsoft Exchange Server in business environments for email, calendar, contact, and task management services exacerbates the severity of the situation. With vulnerable systems identified globally, including significant numbers in countries like Germany, the United States, and the United Kingdom, the potential impact on organizations’ operations and data security is substantial. The absence of a publicly available proof-of-concept (PoC) exploit for CVE-2024-21410 may somewhat limit the number of attackers currently utilizing the flaw, but the threat remains significant, requiring immediate attention from system administrators.

To address the CVE-2024-21410 vulnerability, system administrators are urged to apply the Exchange Server 2019 Cumulative Update 14 (CU14) released during February 2024’s Patch Tuesday. This update includes crucial NTLM credentials Relay Protections to mitigate the risk of exploitation. Additionally, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has listed CVE-2024-21410 in its ‘Known Exploited Vulnerabilities’ catalog, providing federal agencies with a deadline until March 7, 2024, to apply updates or mitigations or discontinue the use of the product. Failure to take prompt action leaves organizations vulnerable to severe consequences, including unauthorized access to confidential data and potential network-wide attacks facilitated by compromised Exchange servers.

Reference:
  • Over the weekend we started reporting Microsoft Exchange versions vulnerable to CVE-2024-21410
  • Critical RCE Patched in Bricks Builder Theme
  • Bricks <= 1.9.6 – Unauthenticated Remote Code Execution
Tags: Cyber AlertCyber Alerts 2024Cyber RiskCyber threatCybersecurityEmail SecurityFebruary 2024Microsoft ExchangeVulnerabilities
ADVERTISEMENT

Related Posts

FreeDrain Phishing Steals Crypto Funds

FBI Warns Cybercriminals Exploit Routers

May 9, 2025
FreeDrain Phishing Steals Crypto Funds

X Scam Targets Crypto Users with Fake Ads

May 9, 2025
FreeDrain Phishing Steals Crypto Funds

FreeDrain Phishing Steals Crypto Funds

May 9, 2025
COLDRIVER Hackers Target Sensitive Data

COLDRIVER Hackers Target Sensitive Data

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

CoGUI Targets Consumer and Finance Brands

May 8, 2025

Latest Alerts

X Scam Targets Crypto Users with Fake Ads

FBI Warns Cybercriminals Exploit Routers

FreeDrain Phishing Steals Crypto Funds

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

Subscribe to our newsletter

    Latest Incidents

    LockBit Ransomware Data Leaked After Hack

    Spanish Consumer Group Faces Cyberattack

    Education Giant Pearson Hit by Data Breach

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial