{"id":17567,"date":"2022-11-24T16:14:14","date_gmt":"2022-11-24T10:44:14","guid":{"rendered":"https:\/\/www.stellarinfo.co.in\/blog\/?p=17567"},"modified":"2022-12-09T11:47:00","modified_gmt":"2022-12-09T06:17:00","slug":"exchange-server-zero-day-vulnerability","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/","title":{"rendered":"How To Recover Data After Exchange Server Zero Day Vulnerability?"},"content":{"rendered":"<table style=\"border: 2px dashed #eee; height: 116px;\">\n<tbody>\n<tr>\n<th style=\"background-color: #eee; text-align: justify;\"><span style=\"font-weight: 400;\">Confirmation has recently come in about a new <\/span><b>Microsoft Exchange Server vulnerability, 2022<\/b><span style=\"font-weight: 400;\">, and that these two vulnerabilities affect the following MS Exchange servers: 2013, 2016, and 2019.\u00a0<\/span><\/p>\n<p><strong><a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\" target=\"_blank\" rel=\"noopener nofollow\">In their official report on the matter,<\/a><\/strong><span style=\"font-weight: 400;\"> Microsoft has identified the two vulnerabilities as <\/span><b>CVE 2022 41040<\/b><span style=\"font-weight: 400;\"> and <\/span><b>CVE 2022 41082<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>CVE 2022 41040<\/b><span style=\"font-weight: 400;\"> is an SSRF \u2014 a server-side request forgery and the second<\/span><\/p>\n<p><b>CVE 2022 41082 <\/b><span style=\"font-weight: 400;\">is an <\/span><b>RCE vulnerability<\/b><span style=\"font-weight: 400;\"> \u2014 RCE is short for remote code execution.<\/span><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Table of Content:<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#srv1\"><strong>What Are The Vulnerabilities?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#srv2\"><strong>How Can The Risk Of Vulnerability Be Mitigated?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#srv3\"><strong>How To Recover Your Server After An Attack?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#srv4\"><strong>Wrapping Up<\/strong><\/a><\/li>\n<\/ol>\n<h2><strong id=\"srv1\">What Are The Vulnerabilities?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">SSRFs make server-side applications send requests to an unauthorized\/ unintended location, and can result in access controls for \/admin being bypassed when the request is returned to the user.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The RCE <\/span><b>CVE 2022 41082<\/b> <b>Microsoft Exchange Server remote code execution vulnerability, (2022) <\/b><span style=\"font-weight: 400;\">allows for malicious code to be executed within server-side applications from the powershell of authorized users that possess admin privileges.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is \u201cworking on an accelerated timeline to release a fix. Until then, we\u2019re providing mitigation advice in order to help customers shield themselves from these attacks\u201d, according to their statements.<\/span><\/p>\n<p><strong><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/09\/30\/analyzing-attacks-using-the-exchange-vulnerabilities-cve-2022-41040-and-cve-2022-41082\/\" target=\"_blank\" rel=\"noopener nofollow\">This blog post by the Microsoft defense team<\/a><\/strong><span style=\"font-weight: 400;\"> contains a detailed analysis of how and where the vulnerabilities are exploited and how they work.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><b>CVE 2022 41040<\/b><span style=\"font-weight: 400;\"> vulnerability can only be deployed and exploited by users that are authorized, and they can then use <\/span><b>CVE 2022 41040<\/b><span style=\"font-weight: 400;\"> to trigger the RCE (<\/span><b>CVE 2022 41082<\/b><span style=\"font-weight: 400;\">) vulnerability, which they then use to launch their PowerShell code.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the Vietnamese outfit, GTSC ,that first discovered the vulnerabilities, the ongoing attacks that are exploiting these vulnerabilities may originate from a chinese-backed hacker group, because the powershell code that was deployed to exploit the <\/span><b>Microsoft Exchange vulnerability, 2022<\/b><span style=\"font-weight: 400;\"> used a microsoft character encoding for simplified Chinese.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The vulnerabilities were reported on the zero day exchange website, <\/span><strong><a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\" target=\"_blank\" rel=\"noopener nofollow\">which can be accessed here<\/a><\/strong><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><strong id=\"srv2\">How Can The Risk Of Vulnerability Be Mitigated?<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Firstly, and this goes without saying, admins need to <\/span><span style=\"font-weight: 400;\">block all exposed and unnecessary Powershell ports that have remote access authorized<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secondly, there has also been released a series of guidelines concerning <\/span><b>Exchange zero-day mitigation<\/b><span style=\"font-weight: 400;\"> by way of URL rewrite instructions, which should be deployed as soon as possible, and followed to a T.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The advised mitigation to reduce exchange server vulnerability, for now is to add blocking scenarios (blocking rules) to the IIS (Internet Information Services) manager in the following path:<\/span><\/p>\n<p><b><i>\u201cInternet Information Services Manager &gt;&gt; Default Site &gt;&gt; Autodiscover &gt;&gt; URL Rewrite &gt;&gt; Actions\u201d and then block the attack patterns that are known.<\/i><\/b><\/p>\n\n<table id=\"tablepress-46\" class=\"tablepress tablepress-id-46\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">S. No.<\/th><th class=\"column-2\">Vulnerability<\/th><th class=\"column-3\">Patch<\/th><th class=\"column-4\">Affected Servers<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">CVE 2022 41040<\/td><td class=\"column-3\">Available, Use EOMT<\/td><td class=\"column-4\">2013 - 2019<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">CVE 2022 41082<\/td><td class=\"column-3\">Unavailable, Block Ports<\/td><td class=\"column-4\">2013 - 2019 including R2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-46 from cache -->\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17569 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-11.png\" alt=\"Exchange Server Zero Day Vulnerability\" width=\"700\" height=\"347\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-11.png 700w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-11-300x149.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-11-150x74.png 150w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">That was the general form, but to apply the mitigation protocol to servers to stop the <\/span><b>Microsoft Exchange Server vulnerability (2022), <\/b><span style=\"font-weight: 400;\">the following steps need to be followed:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Launch The Internet Information Services Manager.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Click on and expand the \u201cDefault Website\u201d.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Select \u201cAutodiscover\u201d.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Navigate to the \u201cFeature\u201d view panel.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Click on \u201cRewrite\u201d.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">On the right side, you will see a panel labeled \u201cactions\u201d. Here, click on \u201cadd rules\u201d.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Select \u201cRequest Blocking\u201d<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Add a string: \u201c.*autodiscover\\.json.*\\@.*Powershell.\u201d, barring the quotes.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Expand this new rule you just created, and select \u201cEdit Under Conditions\u201d.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Change the input conditional operator to REQUEST_URL from URL.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Under the <\/span><b>Microsoft Exchange vulnerability (2022)<\/b><span style=\"font-weight: 400;\">, infiltrators can also make use of the mentioned RCE (<\/span><b>CVE 2022 41082<\/b><span style=\"font-weight: 400;\">), which is why Microsoft Defence Services also recommends blocking the following ports to make infiltration and exploitation harder:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">HTTP: 5985<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">HTTPS: 5986<\/span><\/li>\n<\/ul>\n<h5><strong>Users with administrator privileges can also run a command similar to selecting a string pattern:<\/strong><\/h5>\n<p><em><strong> \u201cpowershell.*autodiscover\\.json\u201d <\/strong><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Within their Internet Information Services Manager log files to check whether the Microsoft Exchange vulnerability (2022) has already affected their exchange servers.<\/span><\/p>\n<p><b>Note<\/b><span style=\"font-weight: 400;\">: Microsoft has stated that only users who have pure on-premise deployments of exchange servers need to make these adjustments, but according to emerging reports, anyone with even hybrid deployments (a mix of on-premise and cloud deployment solutions) also needs to add the blocking rules \u2014 better to be safe than to be sorry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, users with only cloud-based deployments of their exchange servers need not take any action \u2014 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft will handle that for them on their own end.<\/span><\/p>\n<h3><strong id=\"srv3\">How To Recover Your Server After An Attack?<\/strong><\/h3>\n<h4><strong>1. Use The EOMT.<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Microsoft has built a tool, called the <\/span><strong><a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security#exchange-on-premises-mitigation-tool-eomt\" target=\"_blank\" rel=\"noopener\">EOMT<\/a><\/strong><span style=\"font-weight: 400;\"> (an abbreviation for Microsoft\u2019s <\/span><strong><a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security#exchange-on-premises-mitigation-tool-eomt\" target=\"_blank\" rel=\"noopener nofollow\">Exchange On Premises Mitigation Tool<\/a><\/strong><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The tool can be installed from:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given links, and, once the prerequisites have been met, Windows PowerShell needs to be run with administrator privileges enabled, and the script needs to be copied.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then, all that needs to be done is to hit \u201center\u201d.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17570 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-2.png\" alt=\"Backup Fresh Installation\" width=\"750\" height=\"528\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-2.png 750w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-2-300x211.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-2-150x106.png 150w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Users need to have an external internet connection that is sourced from their Exchange servers (with the <\/span><strong><a href=\"https:\/\/www.iis.net\/downloads\/microsoft\/url-rewrite\" target=\"_blank\" rel=\"noopener nofollow\">IIS URL rewrite module<\/a><\/strong><span style=\"font-weight: 400;\"> as well as the <\/span><strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/intelligence\/safety-scanner-download\" target=\"_blank\" rel=\"noopener nofollow\">MS Safety Scanner<\/a><\/strong><span style=\"font-weight: 400;\"> having been downloaded and loaded).<\/span><\/p>\n<h4><strong>2. Install Patch Updates<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Mitigation and remediation of your servers is of utmost importance right now, as an estimated 32,000 servers are still vulnerable, out of the global 400,000 in the latest figures about the <\/span><b>Microsoft Exchange vulnerability (2022)<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Visit <\/span><strong><a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security#who-should-run-the-exchange-on-premises-mitigation-tool\" target=\"_blank\" rel=\"noopener nofollow\">this link<\/a><\/strong><span style=\"font-weight: 400;\"> to read Microsoft\u2019s official blog post about who needs to take what action, whether your <\/span><b>exchange server vulnerability<\/b><span style=\"font-weight: 400;\"> has been patched or not.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another thing you should do, if not completed already, is to install the <\/span><strong><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-exchange-server-security-updates\/ba-p\/2175901\" target=\"_blank\" rel=\"noopener nofollow\">Exchange Server Security Patch<\/a><\/strong><span style=\"font-weight: 400;\">. If you face any issues, there is a <\/span><strong><a href=\"https:\/\/aka.ms\/exupdatefaq\" target=\"_blank\" rel=\"noopener nofollow\">troubleshooting manual for exchange server patch installations<\/a><\/strong><span style=\"font-weight: 400;\"> that can be found at the given link.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is also advised to browse through the lists of known issues during patching, which can be found <\/span><strong><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a><\/strong><span style=\"font-weight: 400;\"> and <\/span><strong><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a><\/strong><span style=\"font-weight: 400;\">, depending on your installation.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17571 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-3.png\" alt=\"Zero Day Vulnerability\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-3.png 500w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-3-300x225.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-3-150x113.png 150w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-3-320x240.png 320w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<h4><strong>3. Backup Fresh Installation<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">You can use the:<\/span><\/p>\n<p><em><strong>Setup\/m:recoverserver<\/strong><\/em><\/p>\n<p><span style=\"font-weight: 400;\">To install a fresh copy of your server from your backups<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then proceed to delete or shut down the infected server(s).<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17572 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-4.png\" alt=\"Backup Fresh Installation\" width=\"612\" height=\"585\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-4.png 612w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-4-300x287.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-4-150x143.png 150w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><\/p>\n<h4><strong>4. Use Dedicated Software<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">This free to use <\/span><span style=\"font-weight: 400;\">exchange server recovery software<\/span><span style=\"font-weight: 400;\"> allows administrators to recover data from downed servers, whether they are down due to an attack, a crash, a power failure, or any corruption otherwise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It supports exchange servers 5.5 through 2019, including R2.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> This allows you to recover mailboxes from affected servers and save them into a Personal Folders File (.PST).<\/span><\/p>\n<p><b>Note:<\/b><span style=\"font-weight: 400;\"> You need to run the EOMT script in an admin PowerShell <\/span><i><span style=\"font-weight: 400;\">before<\/span><\/i><span style=\"font-weight: 400;\"> using the<\/span><span style=\"font-weight: 400;\"><strong>\u00a0<a href=\"https:\/\/www.stellarinfo.co.in\/software\/exchange-server-recovery.php\" target=\"_blank\" rel=\"noopener\">Stellar Exchange Recovery Software<\/a><\/strong><\/span><\/p>\n<h3><strong id=\"srv4\">Wrapping Up<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">The <\/span><b>Microsoft Exchange Server vulnerability (2022)<\/b><span style=\"font-weight: 400;\"> is a real threat, but nothing to be alarmed about \u2014 as you can see, there are plenty of mitigations and remediations that can be made to rectify and <\/span><b>exchange server vulnerabilities<\/b><span style=\"font-weight: 400;\"> that have opened up.<\/span><\/p>\n<p><strong>However, administrators of exchange servers are advised to:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Increase the frequency of their backup schedule<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Backup to more than one local host, should the need for a new install and restore arise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of the major vulnerabilities have been patched by Microsoft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And new solutions are coming in every week or so, which means that the exploits will soon be closed, hopefully forever.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Confirmation has recently come in about a new Microsoft Exchange Server vulnerability, 2022, and that these two vulnerabilities affect the following MS Exchange servers: 2013, 2016, and 2019.\u00a0 In their official report on the matter, Microsoft has identified the two vulnerabilities as CVE 2022 41040 and CVE 2022 41082. CVE 2022 41040 is an SSRF [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":17568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[189],"tags":[],"class_list":["post-17567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-stellar-repair-for-exchange","has_thumb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Recover data after Exchange server zero day vulnerability [2022]<\/title>\n<meta name=\"description\" content=\"There have been two new reported exchange server vulnerability that are being exploited recently: read on to find out how to mitigate them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recover data after Exchange server zero day vulnerability [2022]\" \/>\n<meta property=\"og:description\" content=\"There have been two new reported exchange server vulnerability that are being exploited recently: read on to find out how to mitigate them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog - Tips and Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-24T10:44:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-09T06:17:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vandita Jain\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vandita Jain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recover data after Exchange server zero day vulnerability [2022]","description":"There have been two new reported exchange server vulnerability that are being exploited recently: read on to find out how to mitigate them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/","og_locale":"en_GB","og_type":"article","og_title":"Recover data after Exchange server zero day vulnerability [2022]","og_description":"There have been two new reported exchange server vulnerability that are being exploited recently: read on to find out how to mitigate them.","og_url":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/","og_site_name":"Stellar Data Recovery Blog - Tips and Solutions","article_published_time":"2022-11-24T10:44:14+00:00","article_modified_time":"2022-12-09T06:17:00+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-Image.jpg","type":"image\/jpeg"}],"author":"Vandita Jain","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vandita Jain","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/"},"author":{"name":"Vandita Jain","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/deae85161f02f1cea83a1793d2164add"},"headline":"How To Recover Data After Exchange Server Zero Day Vulnerability?","datePublished":"2022-11-24T10:44:14+00:00","dateModified":"2022-12-09T06:17:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/"},"wordCount":1136,"commentCount":0,"publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-Image.jpg","articleSection":["Stellar Repair for Exchange"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/","name":"Recover data after Exchange server zero day vulnerability [2022]","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-Image.jpg","datePublished":"2022-11-24T10:44:14+00:00","dateModified":"2022-12-09T06:17:00+00:00","description":"There have been two new reported exchange server vulnerability that are being exploited recently: read on to find out how to mitigate them.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#primaryimage","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-Image.jpg","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/11\/Recover-Data-After-Exchange-Server-Zero-Day-Vulnerability-Image.jpg","width":1000,"height":600,"caption":"Recover Data After Exchange Server Zero Day Vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.co.in\/blog\/exchange-server-zero-day-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.co.in\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Recover Data After Exchange Server Zero Day Vulnerability?"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website","url":"https:\/\/www.stellarinfo.co.in\/blog\/","name":"Stellar Data Recovery Blog - Tips and Solutions","description":"","publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.co.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization","name":"Stellar Data Recovery","url":"https:\/\/www.stellarinfo.co.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","width":181,"height":52,"caption":"Stellar Data Recovery"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/deae85161f02f1cea83a1793d2164add","name":"Vandita Jain","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bc609ca9b98c88b028e23b86b9b24d33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc609ca9b98c88b028e23b86b9b24d33?s=96&d=mm&r=g","caption":"Vandita Jain"},"description":"Vandita Jain is a Technology Writer at Stellar. She is a tech enthusiast with over two years of experience in the Data Recovery domain. Vandita loves researching and providing DIY solutions, tips, and tricks to solve Windows technical issues. She is also an avid learner, constantly exploring the latest advancements in technology. Besides, she enjoys traveling and trekking.","url":"https:\/\/www.stellarinfo.co.in\/blog\/author\/user11stellar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/17567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/comments?post=17567"}],"version-history":[{"count":1,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/17567\/revisions"}],"predecessor-version":[{"id":17689,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/17567\/revisions\/17689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media\/17568"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media?parent=17567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/categories?post=17567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/tags?post=17567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}