Language:
Microsoft Exchange on-premises relies heavily on deep integration with Active Directory (AD) for essential functions such as user authentication, mailbox management, and some configuration storage. This integration automatically grants extensive permissions to specific Exchange groups within the AD environment, potentially expanding the attack surface. Today, attackers often exploit these permissions to escalate privileges and gain control over the entire domain.
To mitigate the risks of Microsoft Exchange on-premises, Tenable recommends first adopting the Active Directory split permissions model, as it significantly reduces Exchange's ability to compromise AD users and groups. Additionally, enforcing stricter Access Control Lists (ACLs) further limits Exchange's permissions to essential objects, protecting administrative and sensitive service accounts from unauthorized modifications.
Exchange privilege escalations to Active Directory
Name: Sensitive Exchange Permissions
Codename: C-EXCHANGE-PERMISSIONS
Severity: Critical
Type: Active Directory Indicator of Exposure
Andrew Robbins (@_wald0), Rohan Vazarkar (@CptJesus), Will Schroeder (@harmj0y): BloodHound
dirkjanm: PrivExchange