According to security researchers, the design flaw is in the Microsoft Exchange Email server which provides a leeway for attackers to harvest Windows domain and app credentials from users. Protocol Amit Serper of AVP discovered the bug and after close investigation, it has been found to reside in the Microsoft Autodiscover protocol which is a feature that allows Automatic email server discovery and provides credentials for proper configuration. The protocol is considered to be crucial  and gives admins access in ensuring clients use proper SMTP, LDAP, IMAP and WebDAV among other settings. Back-off mechanism is the cause Serper affirms that the back-off mechanism is the cause of the leak as it is always attempting to resolve the autodiscover part of the domain. It always fails making the autodiscover url that is automatically created reach the owner of the domain. All captured credentials came with no encryption whatsoever in HTTP form. Serper advises users to use more secure forms of authentication such as NTLM and Oauth. Microsoft is investigating the issue and will revert in due course. What do you make of the latest bugs dominating emails? Are there ways you are protecting yourself from such vulnerabilities? Share with us in the comment section below.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ