Microsoft: Outdated Exchange servers fail to auto-mitigate security bugs
Microsoft says outdated Exchange servers cannot receive new emergency mitigation definitions because an Office Configuration Service certificate type is being deprecated.
Emergency mitigations (also known as EEMS mitigations) are delivered via the Exchange Emergency Mitigation Service(EEMS), introduced three years ago in September 2021.
EEMS automatically applies interim mitigations for high-risk (and likely actively exploited) security flaws to secure on-premises Exchange servers against attacks. It detects Exchange Servers vulnerable to known threats and applies interim mitigations until security updates are released.
EEMS runs as a Windows service on Exchange Mailbox servers and is automatically installed on servers with the Mailbox role after deploying September 2021 (or later) cumulative updates on Exchange Server 2016 or Exchange Server 2019.
However, according to the Exchange Team, EEMS "is not able to contact" the Office Configuration Service (OCS) and download new interim security mitigations on out-of-date servers running Exchange versions older than March 2023, instead triggering "Error, MSExchange Mitigation Service" events.
"One of older certificate types in OCS is getting deprecated. A new certificate has already been deployed in OCS, and any server that is updated to any Exchange Server Cumulative Update (CU) or Security Update (SU) newer than March 2023 will continue to be able to check for new EEMS mitigations," the Exchange Team said today.
"If your servers are so much out of date, please update your servers ASAP to secure your email workload and re-enable your Exchange server to check for EEMS rules. It is important to always keep your servers up to date. Running Exchange Server Health Checker will always tell you what you need to do!"
The feature was added after state-sponsored and financially motivated hackers exploited ProxyLogon and ProxyShellzero-days, which lacked patches or mitigation information, to breach Exchange servers.
In March 2021, at least ten hacking groups exploited ProxyLogon, including a Chinese-sponsored threat group known by Microsoft as Hafnium.
Microsoft also urged customers two years ago, in January 2023, to apply the latest supported Cumulative Update (CU) and keep their on-premises Exchange servers patched to ensure they're always ready to deploy emergency security updates.
source: BleepingComputer
Free online web security scanner
Top News:
Bitbucket services “hard down” due to major worldwide outage
January 22, 2025SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation
January 23, 2025Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025
January 22, 2025Windows Server 2025 released—here are the new features
November 5, 2024