{"id":127589,"date":"2021-03-14T19:00:20","date_gmt":"2021-03-15T02:00:20","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=127589"},"modified":"2021-03-15T15:17:16","modified_gmt":"2021-03-15T22:17:16","slug":"patching-microsoft-exchange-servers","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2021\/03\/patching-microsoft-exchange-servers\/","title":{"rendered":"How Quickly Are We Patching Microsoft Exchange Servers?"},"content":{"rendered":"<p>As the world learned about the four zero-day vulnerabilities in Microsoft Exchange Server and the attacks that exploited them, many people wondered how widespread the effects would be. How many organizations are vulnerable to the Microsoft Exchange Server attacks? How likely is it that attackers will take advantage? How quickly are organizations responding to the news and patching Microsoft Exchange Servers? Expanse, a recent Palo Alto Networks acquisition, which provides an attack surface management platform, collected telemetry to answer those questions.<\/p>\n<h2><a id=\"post-127589-_vyuvtb9zbxt2\"><\/a>The Internet is Tiny<\/h2>\n<p>Fifteen years ago, if you accidentally exposed a device on the Internet, it might go unnoticed by attackers for months or even years. Things are different today \u2013 attackers scrutinize your attack surface daily. With open source software anyone can download, an attacker can communicate with every public-facing IP address in IPv4 space in hours. Any unpatched system, misconfiguration or accidental exposure is likely to be discovered very quickly. The internet is tiny.<\/p>\n<p>This is why it\u2019s crucial to apply patches promptly \u2013 new attacks such as the <a href=\"https:\/\/unit42.paloaltonetworks.com\/dearcry-ransomware\/\">DearCry ransomware<\/a> that began circulating around March 9 seek to take advantage of newly disclosed vulnerabilities in Microsoft Exchange Mail Servers to turn a quick profit before organizations have a chance to respond to them.<\/p>\n<h2><a id=\"post-127589-_5mtdlbod9vij\"><\/a>How Quickly are Organizations Patching Microsoft Exchange Servers?<\/h2>\n<p>Expanse continuously gathers information on all Internet accessible devices, and we used our platform to find the total volume of publicly accessible Microsoft Exchange Servers and the subset of servers that were vulnerable. Comparing information gathered three days apart \u2013\u00a0March 8, and then again on March 11 \u2013 allowed us to see not only how many Microsoft Exchange Servers were vulnerable but also to glean some data about the pace at which organizations applied patches.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:56.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-127638 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/03\/Expanse-Networks-Map-Infographic-Dark.png\" alt=\"Expanse, an attack surface management platform, gathered data to determine how quickly organizations are patching Microsoft Exchange Servers. The number of unpatched servers dropped from 125,000 on March 8 to 80,000 on March 11. The map shows blue dots indicating the quantity of unpatched servers in the countries surveyed as of March 11. Countries with the most unpatched Exchange Servers were the US with 20,000; Germany with 11,000; the UK with 4,900; France with 4,000; Italy with 3,700; Russia with 2,900; Canada with 2,700; Switzerland with 2,500; Australia with 2,200; China with 2,100; Austria with 1,700; and the Netherlands with 1,600. \" width=\"900\" height=\"506\" \/><\/span><\/div><\/p>\n<p>Our results show that patch rates are lightning fast \u2013 36% in just three days. From FireEye data on the <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/04\/time-between-disclosure-patch-release-and-vulnerability-exploitation.html\" rel=\"nofollow,noopener\" >time between disclosure, patch release and exploitation<\/a>, we know that in the past the average time to patch was nine days. But patching does not mean you\u2019re safe \u2013\u00a0assume exploitation as a result of this attack, as threat actors were observed widely launching zero-day attacks against very high numbers of Exchange Servers across the internet before a patch was released. (For information about how to handle various scenarios and determine impact on your organization, see Unit 42\u2019s \u201c<a href=\"https:\/\/unit42.paloaltonetworks.com\/remediation-steps-for-the-microsoft-exchange-server-vulnerabilities\/\">Remediation Steps for the Microsoft Exchange Server Vulnerabilities<\/a>.\u201d)<\/p>\n<p>It\u2019s important to understand your attack surface from the attacker's perspective. The statistics above represent <em>all<\/em> publicly facing unpatched Exchange Mail Servers \u2013 but this does <em>not<\/em> mean the affected customers know about them. Acquisitions, foreign subsidiaries, and forgotten or rogue IT often mean enterprises miss outstanding assets, including email servers. With so many attack vectors and limited resources to defend them, it\u2019s crucial that organizations understand where the critical entry points are and how they can prioritize attack surface area reduction in a smart, data-driven way.<\/p>\n<h2><a id=\"post-127589-_62j3wgxd3pj\"><\/a>How to Understand Your Attack Surface<\/h2>\n<p>The attack surface area of an organization has never been more distributed than it is today. Organizations have to identify, track and manage more asset types across different locations than ever before. It won\u2019t work to jump from emergency to emergency \u2013\u00a0you need a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/03\/exchange-server-new-playbook\/\">new playbook<\/a>.<\/p>\n<p>The first step? Understand your attack surface. A discovery and mapping program should start with the basics:<\/p>\n<ul>\n<li>A system of record of every asset, system and service you own that is on the public internet.<\/li>\n<li>Comprehensive indexing, spanning all major port\/protocol pairs (i.e., not limited to the old perspective of only tracking HTTP and HTTPS websites).<\/li>\n<li>Leverage multiple data sources for attribution (i.e., not just registration and DNS data).<\/li>\n<li>No reliance on agents (which can\u2019t find unknown internet assets).<\/li>\n<li>Continuous updating (i.e., not a two-week refresh rate).<\/li>\n<\/ul>\n<p>Read our <a href=\"https:\/\/www.paloaltonetworks.com\/microsoft-exchange-server-incident-response\">response to the Microsoft Exchange Server exploit<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Telemetry data from Expanse\u2019s attack surface management platform details how quickly organizations are patching Microsoft Exchange Servers. <\/p>\n","protected":false},"author":663,"featured_media":127590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724],"tags":[6416,7523,7404,7521,1216,515,626],"coauthors":[7522],"class_list":["post-127589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","tag-attack-surface","tag-attack-surface-management-platform","tag-expanse","tag-microsoft-exchange-server","tag-patch-management","tag-vulnerabilities","tag-zero-days","sec_ops_category-must-read-articles"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/03\/Pen-Pointing.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/127589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=127589"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/127589\/revisions"}],"predecessor-version":[{"id":127652,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/127589\/revisions\/127652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/127590"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=127589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=127589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=127589"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=127589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}