
Summary
The rule aims to detect potential exploitation attempts of ProxyShell vulnerabilities in Microsoft Exchange servers. ProxyShell consists of a series of security flaws (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) that allow an attacker to execute unauthenticated remote code. This detection rule focuses on monitoring web traffic via Cloudflare Web Application Firewall (WAF) logs to identify any incoming requests indicative of ProxyShell exploitation. Specifically, it looks for URI paths that may contain 'autodiscover.json' or other critical Exchange-related endpoints like 'mapi/nspi', 'powershell', 'mapi/emsmdb', '/EWS', and 'X-Rps-CAT'. The logic uses a time window of the last two hours for log analysis, ensuring that only recent potential threats are evaluated. This detection is crucial given the known threat actor associations, including groups like FamousSparrow and Magic Hound, who have employed these vulnerabilities in the wild. The rule is particularly relevant for organizations managing Exchange servers, as unpatched vulnerabilities leave them at significant risk.
Categories
- Cloud
- Web
- Application
Data Sources
- Web Credential
- Application Log
- Network Traffic
ATT&CK Techniques
- T1190
Created: 2024-02-09