Other

Microsoft Exchange ProxyShell Zero-Days RCE β€” CVE-2021-34473, CVE-2021-34523, CVE-2021-31207

πŸ“… 2021-08-13 🏒 Microsoft Exchange Server (on-premises) 🦠 LockFile ransomware, Babuk ransomware, web shells (various) πŸ”Ž CVE-2021-34473 Β· CVE-2021-34523 Β· CVE-2021-31207
Primary Source β†—

Incident Details

ProxyShell is a chain of three Microsoft Exchange Server vulnerabilities β€” CVE-2021-34473 (SSRF/ACL bypass), CVE-2021-34523 (privilege escalation), and CVE-2021-31207 (arbitrary file write) β€” that can be combined to achieve unauthenticated remote code execution on unpatched Exchange servers. Microsoft patched the vulnerabilities in April and May 2021, but they were not widely exploited until security researcher Orange Tsai demonstrated the full attack chain at Black Hat USA 2021 in August. Within days of the Black Hat presentation, mass exploitation began globally. Ransomware groups (LockFile, Babuk, Conti), nation-state actors (APT27, APT35/Charming Kitten), and criminal groups all rapidly adopted the ProxyShell attack chain. CISA issued Emergency Directive 21-03 and multiple advisories urging immediate patching. Thousands of Exchange servers worldwide were compromised; security researchers observed scanning and exploitation attempts within hours of Black Hat. The LockFile ransomware group was one of the most prolific users of ProxyShell, leveraging it alongside PetitPotam (a Windows NTLM relay attack) to compromise organisations within minutes. ProxyShell became one of the most widely exploited vulnerabilities of 2021 alongside Log4Shell. Huntress detected hundreds of web shells installed via ProxyShell. Organisations that had not applied the May 2021 patches were exposed for over three months before mass exploitation began.

Technical Details

Initial Attack Vector
Multiple threat actors exploited three chained vulnerabilities in Microsoft Exchange Server (ProxyShell) after their technical details were demonstrated at Black Hat and DEF CON 2021; the chain allows unauthenticated remote code execution on Exchange servers by combining server-side request forgery, privilege escalation, and arbitrary file write
Vendor / Product
Microsoft Exchange Server (on-premises)
Malware Family
LockFile ransomware, Babuk ransomware, web shells (various)
CVE / GHSA References
CVE-2021-34473 CVE-2021-34523 CVE-2021-31207

Timeline

  1. 2021-08-13 Breach occurred
  2. 2021-08-21 Publicly disclosed