Microsoft Exchange ProxyToken Bug May Allow Email User Theft

Share post:

The details of a Microsoft Exchange Server vulnerability that allows hackers to steal email information have been disclosed.

The vulnerability – “ProxyToken” – allows hackers to send emails without authentication. Instead, the attacker makes a request to web services within the Exchange Control Panel application to gain access to messages from the victim’s inbox.

With this exploit, hackers could also forward messages intended for a target user to an account they control.

The bug was discovered and publicized last March by a researcher at the Information Security Center of Vietnam Posts and Telecommunications Group.

Since its discovery, Microsoft has announced a patch that has been available since July. The tech giant says the vulnerability is not critical, while the National Institute of Standards and Technology puts its severity score at 7.5 out of 10 because an attacker needs an account on the same Exchange server as the victim.

For more information, view the original story from Bleeping Computer.

SUBSCRIBE NOW

Related articles

Sleeper Supply Chain Attack Activates After 6 Years

A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21...

Russian-Controlled Open Source Tool Raises Alarms Over U.S. Cybersecurity

A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny...

Signal Archiving Tool Used By Trump Admin Is Breached, Raising Alarms Over Messaging Security (EDITORIAL)

(EDITORIAL) A messaging tool used by Trump administration officials to archive encrypted Signal messages has been hacked —...

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways