Article Details
Scrape Timestamp (UTC): 2025-01-24 15:28:34.453
Original Article Text
Click to Toggle View
Microsoft: Outdated Exchange servers fail to auto-mitigate security bugs. Microsoft says outdated Exchange servers cannot receive new emergency mitigation definitions because an Office Configuration Service certificate type is being deprecated. Emergency mitigations (also known as EEMS mitigations) are delivered via the Exchange Emergency Mitigation Service(EEMS), introduced three years ago in September 2021. EEMS automatically applies interim mitigations for high-risk (and likely actively exploited) security flaws to secure on-premises Exchange servers against attacks. It detects Exchange Servers vulnerable to known threats and applies interim mitigations until security updates are released. EEMS runs as a Windows service on Exchange Mailbox servers and is automatically installed on servers with the Mailbox role after deploying September 2021 (or later) cumulative updates on Exchange Server 2016 or Exchange Server 2019. However, according to the Exchange Team, EEMS "is not able to contact" the Office Configuration Service (OCS) and download new interim security mitigations on out-of-date servers running Exchange versions older than March 2023, instead triggering "Error, MSExchange Mitigation Service" events. "One of older certificate types in OCS is getting deprecated. A new certificate has already been deployed in OCS, and any server that is updated to any Exchange Server Cumulative Update (CU) or Security Update (SU) newer than March 2023 will continue to be able to check for new EEMS mitigations," the Exchange Team said today. "If your servers are so much out of date, please update your servers ASAP to secure your email workload and re-enable your Exchange server to check for EEMS rules. It is important to always keep your servers up to date. Running Exchange Server Health Checker will always tell you what you need to do!" The feature was added after state-sponsored and financially motivated hackers exploited ProxyLogon and ProxyShellzero-days, which lacked patches or mitigation information, to breach Exchange servers. In March 2021, at least ten hacking groups exploited ProxyLogon, including a Chinese-sponsored threat group known by Microsoft as Hafnium. Microsoft also urged customers two years ago, in January 2023, to apply the latest supported Cumulative Update (CU) and keep their on-premises Exchange servers patched to ensure they're always ready to deploy emergency security updates.
Daily Brief Summary
Microsoft reports outdated Exchange servers cannot receive new emergency security mitigations due to a deprecated certificate.
On-premises Exchange servers without recent updates are exposed to high-risk security flaws actively exploited in cyberattacks.
Emergency Mitigation Service (EEMS), launched in 2021, automatically protects servers by applying temporary security fixes against known threats.
EEMS is unable to retrieve new mitigations for Exchange versions older than March 2023, resulting in service errors.
Microsoft urges updating servers to enable continuous deployment of emergency mitigations and maintain email security.
Previous cyber-attacks used exploits for which Exchange had no patches, prompting the initial need for EEMS.
Regularly running the Exchange Server Health Checker helps identify necessary updates and security actions.