Are Corporate Networks at Risk Due to SharePoint Vulnerability?

November 11, 2024
Are Corporate Networks at Risk Due to SharePoint Vulnerability?

The recent exploitation of a severe remote code execution vulnerability in Microsoft SharePoint, designated CVE-2024-38094, has raised significant concerns among cybersecurity professionals. This vulnerability enables attackers to infiltrate corporate networks despite the release of a patch from Microsoft in July 2024. SharePoint is a critical component of the Microsoft 365 ecosystem, serving functions such as building intranets, dedicated web applications, and websites, as well as managing documents with SharePoint teams integrated with Microsoft Teams. The vulnerability remains a high-priority issue, especially since the Cybersecurity and Infrastructure Security Agency (CISA) recently included it in their catalog of known exploited vulnerabilities.

Malicious Exploitation Mechanisms

Unauthorized Access and Initial Breach

According to cybersecurity firm Rapid7, attackers are leveraging CVE-2024-38094 by gaining unauthorized access to vulnerable SharePoint servers. The initial stages of this exploitation involve using a publicly available proof-of-concept exploit to install a webshell, which provides a foothold into the network. The attackers then focus their attention on a Microsoft Exchange service account that holds domain administrator privileges. This account is key to their strategy as it allows them to escalate their access within the network significantly.

Once inside the network, the attackers proceed to install Huorong Antivirus, a tool noted for causing resource and service conflicts with existing security measures. This installation effectively disables legitimate antivirus services, creating an environment where further malicious activity can be executed without detection. Rapid7’s investigation indicates that the attackers used a detailed batch script to install Huorong Antivirus, establish a custom service, run specific drivers, and execute additional malicious files. This penetration method underscores the sophistication and planning behind the attacks.

Targeting Network Defenses and Elevating Access

With their elevated access, attackers are deploying tools designed for further infiltration and disabling of network defenses. Tools like Mimikatz are used to steal credentials, which are invaluable for moving laterally within the network. Mimikatz enables the extraction of passwords, hashes, PINs, and other authentication details directly from memory. Additionally, the attackers utilized Fast Reverse Proxy (FRP) to facilitate remote access, effectively tunneling traffic through the firewall and enhancing their control over the compromised network.

Another critical aspect of their strategy involves disrupting Windows Defender and altering event and system logs to avoid detection. These methods reveal a multi-faceted approach to ensure persistence within the compromised network. The attackers further employed tools like everything.exe for file search operations, Certify.exe for manipulating certificates, and Kerbrute for Active Directory enumeration. These tools allowed them to navigate through the network seamlessly and manipulate the Active Directory environment, adding to the complexity of the breach and highlighting the necessity of robust security measures.

Urgent Need for Proactive Defense

Importance of Timely Patch Management

The persistent exploitation of the SharePoint vulnerability illustrates the vital importance of timely and effective patch management within corporate IT environments. With the vulnerability classified as “important” by Microsoft, it remains critical for organizations to ensure their Microsoft 365 environments are updated with the latest security patches. This proactive management is necessary to prevent cyber threats from exploiting known vulnerabilities. The consensus among cybersecurity experts is that a lapse in applying these updates can provide ample opportunity for attackers to compromise sensitive data and systems.

Organizations must adopt a more rigorous approach to patch management, recognizing that security patches are not mere suggestions but essential components of their defense strategy. The ongoing exploitation of CVE-2024-38094 by malicious actors underscores the need for organizations to regularly audit their systems to identify and rectify any unpatched vulnerabilities. Such audits, coupled with the application of patches as soon as they are released, can significantly reduce the risk of network breaches.

Enhanced Network Monitoring and Response

The recent exploitation of a critical remote code execution vulnerability in Microsoft SharePoint, identified as CVE-2024-38094, has created significant alarm among cybersecurity experts. Despite Microsoft releasing a patch in July 2024 to address this issue, attackers are still managing to breach corporate networks. SharePoint is an essential part of the Microsoft 365 suite, used for building intranets, creating dedicated web applications and websites, and managing documents, often in conjunction with SharePoint teams integrated into Microsoft Teams. This vulnerability remains a top-priority concern, especially now that the Cybersecurity and Infrastructure Security Agency (CISA) has added it to their catalog of known exploited vulnerabilities. Given SharePoint’s extensive use in corporate environments, the potential for damage is considerable, making this a particularly urgent issue for organizations worldwide. Ensuring your systems are updated and monitored is crucial to mitigate this ongoing threat.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later