No new security vulnerability in Outlook Web Access (OWA)

Published Oct 07 2015 09:43 AM 22.4K Views

Recently reports of a new security vulnerability in OWA, a component of Microsoft Exchange Server, have been circulated throughout the internet. Microsoft considers the security of our products to be a top responsibility to our customers.

We have investigated these reports and believe that a properly deployed and secured Exchange Server is not susceptible to the attacks referenced in these posts. One of the reports in question skips over the important details of how an attacker might ‘gain a foothold into a highly strategic asset’ if a system is properly managed, secured, and up-to-date. The “attack” in question could only be initiated by an individual who had administrative access to a server’s file system and services, or who had permission to logon to an Exchange Server console with the rights to replace Exchange system files, and perform an Internet Information Server (IIS) reset.

Microsoft recommends that IT administrators use the latest products and services, in combination with industry best practices for IT management to avoid the condition outlined in these reports.

The Exchange Team

2 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-604069%22%20slang%3D%22en-US%22%3ENo%20new%20security%20vulnerability%20in%20Outlook%20Web%20Access%20(OWA)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-604069%22%20slang%3D%22en-US%22%3E%3CP%3E%3C%2FP%3E%3CP%3ERecently%20reports%20of%20a%20new%20security%20vulnerability%20in%20%3CACRONYM%20title%3D%22Outlook%20Web%20App%22%3EOWA%3C%2FACRONYM%3E%2C%20a%20component%20of%20Microsoft%20Exchange%20Server%2C%20have%20been%20circulated%20throughout%20the%20internet.%20Microsoft%20considers%20the%20security%20of%20our%20products%20to%20be%20a%20top%20responsibility%20to%20our%20customers.%3C%2FP%3E%0A%3CP%3EWe%20have%20investigated%20these%20reports%20and%20believe%20that%20a%20properly%20deployed%20and%20secured%20Exchange%20Server%20is%20%3CSPAN%20style%3D%22text-decoration%3Aunderline%3B%22%3Enot%3C%2FSPAN%3Esusceptible%20to%20the%20attacks%20referenced%20in%20these%20posts.%20One%20of%20the%20reports%20in%20question%20skips%20over%20the%20important%20details%20of%20how%20an%20attacker%20might%20%E2%80%98gain%20a%20foothold%20into%20a%20highly%20strategic%20asset%E2%80%99%20if%20a%20system%20is%20properly%20managed%2C%20secured%2C%20and%20up-to-date.%20The%20%E2%80%9Cattack%E2%80%9D%20in%20question%20could%20only%20be%20initiated%20by%20an%20individual%20who%20had%20administrative%20access%20to%20a%20server%E2%80%99s%20file%20system%20and%20services%2C%20or%20who%20had%20permission%20to%20logon%20to%20an%20Exchange%20Server%20console%20with%20the%20rights%20to%20replace%20Exchange%20system%20files%2C%20and%20perform%20an%20Internet%20Information%20Server%20(IIS)%20reset.%3C%2FP%3E%0A%3CP%3EMicrosoft%20recommends%20that%20IT%20administrators%20use%20the%20latest%20products%20and%20services%2C%20in%20combination%20with%20industry%20best%20practices%20for%20IT%20management%20to%20avoid%20the%20condition%20outlined%20in%20these%20reports.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22author%22%3EThe%20Exchange%20Team%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-604069%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAnnouncements%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jul 01 2019 04:24 PM
Updated by: