0% found this document useful (0 votes)
69 views2 pages

TSMC SupplyProfile - Ann - Attached - File - 供應鏈資訊安全 威脅通知 微軟 Exchange Server 重大資安漏洞

Uploaded by

anw76752
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views2 pages

TSMC SupplyProfile - Ann - Attached - File - 供應鏈資訊安全 威脅通知 微軟 Exchange Server 重大資安漏洞

Uploaded by

anw76752
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

供應鏈資訊安全威脅通知 – 微軟 Exchange Server 重大資安漏洞

Unleash Innovation

安全研究機構警告,微軟 Exchange Server 重大資安漏洞(CVE-2024-21410)影響大量伺服器,呼籲管理員應即時


更新軟體以防範風險。 CVE-2024-21410 為一權限升級漏洞,可能導致 Pass-the-Hash 攻擊,即駭客轉送使用者
的 Exchange Server Net-NTLMv2 雜湊憑證,冒充用戶身份存取目標伺服器,造成遠端程式碼執行或資訊外洩。
微軟指出,這項漏洞出於 Exchange Server 2019 並未預設 NTLM 憑證轉送的防護(或是 Extended Protection
for Authentication, EPA)。台積電未受到影響且已採取預防措施,建議用戶盡快採取安全措施阻止漏洞攻擊。

➢ 受影響的版本 : Exchange Server 2019 and Exchange Server 2016

➢ 建議採取措施: 建議盡快升級至無漏洞版本, 若短時間無法升級請參考微軟網站進行暫時防堵措施


✓ 參考連結: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410

✓ Mitigations: Consult the Exchange Extended Protection documentation and use the
ExchangeExtendedProtectionManagement.ps1 script to turn on the Extended Protection for Authentication
(EPA) for Exchange Servers.

台積電 企業資訊安全 及 資材管理


Serial number: 202402221731-9451093
© 2024 TSMC, Ltd 0 Security C - TSMC Secret
Supply Chain Security Threat Notification –
Microsoft Exchange Server High Severity Vulnerability Unleash Innovation

The security research institute has issued a warning that a high severity vulnerability (CVE-2024-21410) in Microsoft
Exchange Server affects a large number of servers, and urges administrators to update the software immediately to
prevent risks. CVE-2024-21410 is a privilege escalation vulnerability that may lead to Pass-the-Hash attacks, where
hackers forward the user's Exchange Server Net-NTLMv2 hash credential, impersonate the user's identity to access
the target server, and cause remote code execution or information leakage. Microsoft pointed out that this vulnerability
is not protected by default NTLM credential forwarding (or Extended Protection for Authentication, EPA) in Exchange
Server 2019. TSMC has not been affected and has taken preventive measures. To reduce the security risks of the
supply chain, please help to take immediate security measures to prevent vulnerability attacks.

➢ Affected versions : Exchange Server 2019 and Exchange Server 2016

➢ Recommended actions: It is recommended to upgrade to the version without vulnerability as soon as possible. If
unable to upgrade in a short time, please refer to the Microsoft website for temporary mitigation measures.
✓ Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410
✓ Mitigations: Consult the Exchange Extended Protection documentation and use the
ExchangeExtendedProtectionManagement.ps1 script to turn on the Extended Protection for Authentication (EPA) for Exchange
Servers.

TSMC Corporate
Serial number: 202402221731-9451093 Information Security & Material Management
© 2024 TSMC, Ltd 1 Security C - TSMC Secret

You might also like