Government-backed groups are exploiting CVE-2020-0688 to take over Exchange email servers

Multiple government-backed hacking groups are exploiting a recently-patched vulnerability in Microsoft Exchange email servers.

The exploitation attempts were first spotted by UK cyber-security firm Volexity on Friday and confirmed today to ZDNet by a source in the DOD.

Volexity did not share the names of the hacking groups exploiting this Exchange vulnerability. Volexity did not return a request for comment for additional details.

The DOD source described the hacking groups as “all the big players,” also declining to name groups or countries.

THE MICROSOFT EXCHANGE VULNERABILITY

These state-sponsored hacking groups are exploiting a vulnerability in Microsoft Exchange email servers that Microsoft patched last month, in the February 2020 Patch Tuesday.

The vulnerability is tracked under the identifier of CVE-2020-0688. Below is a summary of the vulnerability’s technical details:

  • During installation, Microsoft Exchange servers fail to create a unique cryptographic key for the Exchange control panel.
  • This means that all Microsoft Exchange email servers released during the past 10+ years use identical cryptographic keys (validationKey and decryptionKey) for their control panel’s backend.
  • Attackers can send malformed requests to the Exchange control panel containing malicious serialized data.
  • Since hackers know the control panel’s encryption keys, they can ensure the serialized data is unserialized, which results in malicious code running on the Exchange server’s backend.
  • The malicious code runs with SYSTEM privileges, giving attackers full control of the server.

Microsoft released patches for this bug on February 11, when it also warned sysadmins to install the fixes as soon as possible, anticipating future attacks.

By Catalin Cimpanu | March 9, 2020

Click to read the entire article on ZDNet

More Posts

May 11 through 14, 2026

This week I will be working on completing adding pages to the bbn-net.com website. I will also be working on my online courses. The information

May 04 through 07, 2026

This week I will be preparing the April monthly report, This week I will be monitoring the bbn-net.com website to improve the SEO performance of

April 27 through 30, 2026

This week I will be preparing for the end of month. This week I will be preparing for the end of month. I will be

April 20 through 23, 2026

This week I will be adding pages and content to the bbn-net.com website. These additions will have no impact on site functions but will simply