Get a Pentest and security assessment of your IT network.

Cyber Security

Exchange Image Compression & HTTP Attacks

TL;DR

Yes, Exchange/OWA can still compress static images and remain relatively immune to HTTP compression attacks with the correct configuration. Modern versions of Exchange automatically handle this for most scenarios, but it’s important to verify settings and understand potential risks.

Solution Guide

  1. Understand Image Compression in Exchange
    • Exchange typically compresses images (like logos or background images) used within OWA. This reduces bandwidth usage and improves page load times.
    • The compression is usually done on the server-side before sending the image to the client’s browser.
    • Modern Exchange versions use efficient compression algorithms like gzip, which are generally safe when implemented correctly.
  2. HTTP Compression Attacks: The Risk
    • An HTTP compression attack (like CRIME or BREACH) exploits vulnerabilities in how web servers handle compressed content.
    • These attacks can potentially allow attackers to steal sensitive information from encrypted HTTPS connections by manipulating the compression process.
    • The risk is higher when dealing with dynamic content that includes user-specific data within compressed responses. Static images are less vulnerable because they don’t change based on the user.
  3. Verify Compression Settings in Exchange

    Check if HTTP compression is enabled globally for your Exchange server.

    Get-ExchangeServer | Select HttpCompressionEnabled
    • If HttpCompressionEnabled is False, you may need to enable it (see Step 4).
  4. Enable HTTP Compression (if disabled)

    Use the following command in Exchange Management Shell:

    Set-ExchangeServer -Identity <YourExchangeServerName> -HttpCompressionEnabled $true
  5. Configure IIS Compression Levels

    Fine-tune compression settings in Internet Information Services (IIS) for optimal performance and security.

    • Open IIS Manager.
    • Select your Exchange server in the Connections pane.
    • Double-click “Compression Features”.
    • Adjust compression levels for static files (like images). Generally, a moderate level of compression is sufficient. Avoid extremely high compression levels as they can increase CPU usage without significant benefit.
  6. Keep Exchange Updated
    • Microsoft regularly releases security updates that address vulnerabilities in Exchange, including those related to HTTP compression attacks.
    • Ensure your Exchange server is running the latest cumulative update (CU) or service pack.
  7. Use TLS 1.2 or Higher
    • TLS 1.2 and higher provide stronger encryption than older versions, making it more difficult for attackers to exploit compression vulnerabilities.
    • Verify that your Exchange server is configured to use TLS 1.2 or higher.
  8. Monitor for Suspicious Activity
    • Regularly review Exchange logs for any unusual patterns of activity, such as large numbers of requests for static images or unexpected errors related to compression.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation