TSMC SupplyProfile - Ann - Attached - File - 供應鏈資訊安全 威脅通知 微軟 Exchange Server 重大資安漏洞
TSMC SupplyProfile - Ann - Attached - File - 供應鏈資訊安全 威脅通知 微軟 Exchange Server 重大資安漏洞
Unleash Innovation
✓ Mitigations: Consult the Exchange Extended Protection documentation and use the
ExchangeExtendedProtectionManagement.ps1 script to turn on the Extended Protection for Authentication
(EPA) for Exchange Servers.
The security research institute has issued a warning that a high severity vulnerability (CVE-2024-21410) in Microsoft
Exchange Server affects a large number of servers, and urges administrators to update the software immediately to
prevent risks. CVE-2024-21410 is a privilege escalation vulnerability that may lead to Pass-the-Hash attacks, where
hackers forward the user's Exchange Server Net-NTLMv2 hash credential, impersonate the user's identity to access
the target server, and cause remote code execution or information leakage. Microsoft pointed out that this vulnerability
is not protected by default NTLM credential forwarding (or Extended Protection for Authentication, EPA) in Exchange
Server 2019. TSMC has not been affected and has taken preventive measures. To reduce the security risks of the
supply chain, please help to take immediate security measures to prevent vulnerability attacks.
➢ Recommended actions: It is recommended to upgrade to the version without vulnerability as soon as possible. If
unable to upgrade in a short time, please refer to the Microsoft website for temporary mitigation measures.
✓ Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
✓ Mitigations: Consult the Exchange Extended Protection documentation and use the
ExchangeExtendedProtectionManagement.ps1 script to turn on the Extended Protection for Authentication (EPA) for Exchange
Servers.
TSMC Corporate
Serial number: 202402221731-9451093 Information Security & Material Management
© 2024 TSMC, Ltd 1 Security C - TSMC Secret