Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close

Windows Server 2012 End of Life –– How do You Secure Legacy Servers?

Posted by Jay Kurup on October 21, 2024

In late 2023, Microsoft Windows Server 2012 and 2012 R2 reached their end of life. Microsoft is ending free updates, bug fixes, and technical support to an operating system still used in hundreds of thousands of enterprise servers.

 Windows Server End of Life

Microsoft allows customers to purchase Extended Security Updates (ESUs) until 2026. However, their core recommendation for Windows 2012 users is to migrate to the cloud with Azure or upgrade their on-prem servers to Windows Server 2022. 

As we've covered in a previous blog post about legacy risks, business-critical servers are often either too operationally critical or create so many dependencies that upgrading or migrating them is effectively impossible.  

The Windows 2012 end of support is no surprise. Microsoft follows a well-established product lifecycle and notifies of OS sunsetting years in advance. If an organization has not upgraded its Windows 2012 servers by now, it's likely not going to do so in the near future, either. So, what can they do instead? 

 Windows End of Service Screen

The Legacy Server Landscape 

Windows legacy servers are a growing source of risk.  

Available market share data puts the percentage of servers running on an out-of-support Windows operating system (such as Windows 2008, 2008r2, 2012, and 2012 r2), at around 10 percent of all servers in use today. 

There are hundreds of thousands of Windows legacy servers currently supporting critical functions - all of which have exploitable vulnerabilities. At the time of writing, Microsoft has published 759 common vulnerabilities and exposures (CVEs) so far this year; in 2023, 1,228 vulnerabilities were reported.

Recent data indicates that unsupported Microsoft systems and servers—including Windows 7, Windows 8, Windows Server 2008, and Windows Server 2012—are impacted by thousands of Common Vulnerabilities and Exposures (CVEs).  

Here’s a rough breakdown: 

  • Windows 7 and Windows Server 2008 R2: Since their release, Windows 7 and Server 2008 R2 have accumulated over 1,300 CVEs, with vulnerabilities ranging from privilege escalation to remote code execution. Most of these CVEs are no longer addressed as the systems are unsupported. 
  • Windows 8/8.1: With the introduction of Windows 8 and 8.1, many security vulnerabilities were discovered and reported. These versions collectively have hundreds of CVEs, and, like Windows 7, they are no longer patched for new threats. 
  • Windows Server 2012 and 2012 R2: As of their end-of-life in October 2023, Windows Server 2012 and 2012 R2 had accumulated over 1,000 CVEs. These include vulnerabilities in core services, such as IIS, RDP, and SMB, that are commonly targeted by attackers.

Many of these CVEs affect core services like Remote Desktop Protocol (RDP), SMB (Server Message Block), and other networking services, making them highly attractive to attackers. The threat is particularly severe because many of these older systems no longer receive patches or updates to mitigate newly discovered vulnerabilities. 

The number of CVEs impacting unsupported systems will continue to grow as new vulnerabilities discovered in supported versions are often found in legacy versions as well, even though they are no longer patched. This makes these systems a significant security liability. 

New call-to-action

 

Windows legacy servers and systems are a growing source of risk 

If you work in a manufacturing business, healthcare organization, financial institution, or any company that uses OT, your organization likely relies on servers powered by one or more of these legacy systems.  

The risks legacy systems create are well known (we've written about how to protect Windows 7, 8, 8.1, and Windows Server 2008 R2). Still, it's worth noting that Windows 2012 adds over two and a half thousand known vulnerabilities (of which over 100 have been exploited) to the legacy risk register.  

Experience from past operating sunsets shows that exploit developers comb legacy codebases for exploitable bugs long after developers stop doing the same thing. Threat actors continue to scan and find exploitable legacy vulnerabilities in their target environments.  

Proof of this: in recent months Morphisec has prevented over 600 high-priority security incidents, compromising of over 40 distinct malware families on our client's Windows Legacy OS endpoints alone.  

 

Attacks prevented by Morphisec on Windows Legacy –bypassed the installed EPP/EDRs 

Attack Prevented 

Description  

Operating System  

Cobaltstrike Backdoor 

Cobaltstrike is a modular backdoor which frequently leads to domain propagation and exploitation to deploy attacks such as Ransomware and IP Theft. 

Windows 7 

Windows Server 2008  

Windows Server 2012 

Metasploit Framework 

Metasploit framework is a very powerful tool which can be used by cybercriminals as well as ethical hackers to probe systematic vulnerabilities on networks and servers. 

Windows 7 

Windows 8 

Windows Server 2012 

Gamarue Malware 

Gamarue is a malware family that downloads files to enable information theft from infected systems. Gamarue family worm variants can contaminate USB drives or portable hard drives that were connected to an infected system. 

Windows 7 

Log4Shell Exploitation 

Exploitation of Log4Shell in Ubiquiti Unifi application. 

Windows Server 2012 

Mimikatz Password Theft 

Mimikatz is a program that provides a set of tools for collecting and using Windows credentials on target systems. 

Windows 7 

Windows Server 2012 

ProxyShellMiner 

ProxyShellMiner is an advanced group of hackers that utilize ProxyShell exploits to spread a crypto miner. 

Windows 7 

Windows Server 2008  

Windows Server 2012 

Squiblydoo Remote Code Execution 

Whitelisting bypass through regsvr32 and scrobj.dll - allows remote code execution. 

Windows 7 

Windows Server 2008 

Windows Server 2012 

Source: Morphisec Threat Data 

 

Legacy Servers Create Ransomware Risks 

Legacy Windows OSs often feature in ransomware attack chains. Modern ransomware threat groups target legacy OSs to establish persistence and propagate attacks.  

One of the most common Windows legacy server attacks that Morphisec stops on legacy servers involves Cobalt Strike. This modular backdoor tool was developed for pen testing but is now exploited by threat actors using cracked versions. Cobalt Strike often leads to domain propagation and exploitation as part of an attack chain that results in ransomware deployment and IP theft. 

Critically, Cobalt Strike targets an endpoint's runtime memory. This makes it a particularly dangerous threat for servers running Windows Legacy OSs such as Server 2012, which are at an increased risk of exposure to fileless malware and threats exploiting runtime memory.  Legacy systems, lacking modern defenses, are more susceptible to these runtime-based attacks. 

 

Windows Legacy Server EDR Challenges 

With such a high-risk profile, end of life Windows servers demand protection from ransomware and other threats. Without vendor support, devices running EOL and non-supported operating systems become a continuous source of exploitable vulnerabilities. Threat actors can also work back from vulnerabilities found in current OS versions to find new ways of compromising older machines. But more attackers wait for a patch to be released to developN-day exploits.  

Due to the iterative nature of OS development, exploitable vulnerabilities that vendors discover and patch in newer versions of Windows OS systems are sometimes found in older versions—where they will never be officially fixed. EOL support puts many more devices into this "never going to be replaced or patched" category. 

Since legacy servers often host business-critical processes, and due to their increased exposure, they must be protected by state-of-the-art endpoint protection solutions. Unfortunately, the Endpoint Detection and Response (EDR) technology you might use to protect other parts of your network is not fit for this task. 

There are several reasons for the mismatch between EDR and Windows legacy servers.  

On a more fundamental level, legacy systems are not an environment that EDRs are optimized for. Although you can install EDR agents on legacy servers, the techniques the EDR systems rely on for detection are optimized or designed for the current OS in use. Therefore the effectiveness of EDRs on legacy OS is curtailed, giving adversaries easier methods to evade EDRs and create points of persistence.

Older legacy systems (i.e., anything running Windows 7 and 2008 R2) will only have a limited version of the Event Tracing for Windows (ETW). This means that an installed EDR won't be able to get as much real-time information as it would on a modern system. The result is less visibility and a lower detection rate for advanced thetas. 

Any server running an OS older than Windows Server 2016 will also not have Microsoft's Anti-Malware Scanning Interface (AMSI). All modern EDRs use this technology to spot obfuscated and packed scripts, evasive macros, and most "living off the land" techniques. 

 

Comparison of security features of Windows Server 2016, 2012 R2, 2008 R2 

Security Capability 

Windows Server 2008 R2 

Windows Server 2012 R2 

Windows Server 2016 and above 

Shielded Virtual Machines 

 Not Supported

 Not Supported

 Fully Supported

Host Guardian Service: 

 Not Supported

 Not Supported

 Fully Supported

Anti-Malware Scanning Interface (AMSI) 

 Not Supported

 Not Supported

 Fully Supported

Event Tracing Windows (ETW) 

 Limited Support

 Limited Support

 Fully Supported

Just Enough Administration (JEA) 

 Fully Supported

 Fully Supported

 Fully Supported

Just-in-Time Administration (JIT) 

 Limited Support

 Fully Supported

 Fully Supported

Credential Guard 

 Not Supported

 Not Supported

 Fully Supported

Remote Credential Guard 

 Not Supported

 Not Supported

 Fully Supported

Device Guard 

 Not Supported

 Not Supported

 Fully Supported

AppLocker 


Limited Support

 Fully Supported

 Fully Supported

Windows Defender 

 Limited Support

 Limited Support

 Fully Supported

Control Flow Guard 


Not Supported

 Not Supported

 Fully Supported

Generation 2 virtual machines: 

 Not Supported

 Limited Support

 Fully Supported

Enhanced auditing for threat detection 

 Not Supported

 Limited Support

 Fully Supported

Dynamic Access Control 

 Not Supported

 Fully Supported

 Fully Supported

Windows Firewall with Advanced Security 

 Not Supported

 Fully Supported

 Fully Supported

BitLocker 

 Limited Support

 Fully Supported

 Fully Supported

Small-footprint Hyper-V host (Server Core

 Limited Support

 Limited Support

 Fully Supported

 Source: Microsoft

Legend: Not Supported image-png-1 | Limited Support image-png-3 | Fully Supported image-png-2

 

Can you get effective legacy security?  

If upgrading to Windows Server 2022 or migrating to the cloud via Azure is off the table, there are still a few viable strategies to manage legacy security risks: 

  1. Extended Security Updates (ESUs): Microsoft offers Extended Security Updates for Windows Server 2012 and 2012 R2 until October 2026. These updates provide temporary relief but are only a short-term solution. 
  2. Virtual Patching Solutions: Virtual patching helps mitigate vulnerabilities by monitoring system behavior and blocking malicious activity without needing official software updates. Morphisec’s Automated Moving Target Defense (AMTD) technology acts as a virtual patching and compensating control for unpatched vulnerabilities, providing protection even before a vulnerability has been discovered and a patch developed. 
  3. Third-Party Security Solutions: Lightweight, compatible solutions like Morphisec can provide advanced protection even for legacy systems, ensuring that even if your devices can't receive patches, they can still defend against modern cyber threats.

As any cybersecurity practitioner knows, securing legacy systems is a daunting challenge. Because they lack power compared to current systems, legacy systems need a lightweight security solution.   

They also need something that’s compatible with their software—both factors that rule out most of today’s industry-leading security solutions such as EPP, EDR, and XDR/MDR. (Legacy systems lack basic mechanisms used by EDRs such as script scanning through AMSI.) 

Adaptive Exposure Management (AEM) is a component of Morphisec’s Anti-Ransomware Assurance Suite. AEM represents the future of exposure management by introducing a dynamic and proactive strategy. Powered by AMTD, it continually adapts to an organization’s evolving attack surface, anticipating changes and vulnerabilities across the organization’s digital infrastructure.   

Next-gen vulnerability prioritization offers continuous, risk-driven remediation recommendations tailored to your business context, streamlining patch management efforts. 

 Download the Achieving Adaptive Cyber Resiliency white paper to help your firm  achieve a strengthened security posture. to learn more about adaptive cyber resiliency strategy and how AEM can support it.

Achieving Adaptive Cyber Resiliency White Paper