Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Microsoft Exchange Autodiscover protocol

Issued: 
Monday, 4 October, 2021
Last Revision: 
Monday, 4 October, 2021
Vendor: 
Severity Level: 
Summary: 

Autodiscover is a protocol used by Microsoft Exchange for automatic configuration of clients such as Microsoft Outlook.

 

It has a design flaw that causes the protocol to “leak” web requests to Autodiscover domains outside of the user’s domain but in the same TLD (i.e. Autodiscover.com).

 

This is a severe security issue, since if an attacker can control such domains or has the ability to “sniff” traffic in the same network, they can capture domain credentials in plain text (HTTP basic authentication) that are being transferred over the wire.

 

                   Description

CVE

CVSS3.0 Score

Microsoft’s Exchange Autodiscover protocol

N/A

N/A

 

                                                                                    Table 1: Vulnerability details

 

 

Vulnerability / CVE

 

Affected Product(s)

       N/A

 

Microsoft Exchange

 

 

                                                                                Table 2: Vulnerability Versions

Recommendation: 

Disable the basic authentication, when deploying or configuring Exchange setup. Using HTTP basic authentication communicate with plain text.

 

Block Autodiscover domains such as "Autodiscover.com.cn" in your firewall.

 

Software developers should implement the Autodiscover protocol to never construct the domains such as “Autodiscover” by the “back-off” algorithm.