New security updates for Exchange Server (April 2021)

Microsoft has released new security updates for all Exchange Server versions (2013 - 2019). These are likely to fix the vulnerabilities that were used in the Pwn2Own 2021 to attack Exchange Server. The following vulnerabilities are fixed: CVE-2021-28483 CVE-2021-28482 CVE-2021-28481 CVE-2021-28480 Here is a description from the Pwn2Own website, probably exactly this ... Read more

GRAMMM: A new alternative to Exchange Server?

The relatively young company grammm wants to offer an alternative to Exchange Server with its product of the same name. The idea itself is not new, as there have long been a number of projects (such as Open-X-Change, Kopano or Zimbra) that position themselves as an alternative to Exchange Server. grammm (groupware and much much more), however, is the first to offer Open ... Read more

Exchange Quarantine: User cannot access mailbox

A single user was no longer able to access his mailbox after a database failure due to a full log file partition. The problem only affected one user, while all other users were able to access the mailboxes in the database again. A general problem with the database could therefore be ruled out. The settings of the ... Read more

WIN-ACME: Installation of an Exchange CU fails

On an Exchange 2016 server that had configured its certificate from Let's Encrypt with the WIN-ACME client, the installation of a CU was aborted with an error at step 16 of 18: Here is the full test of the error message: Error: The following error was generated when "$error.Clear(); Install-ExchangeCertificate -services "IIS, POP, IMAP" -DomainController $RoleDomainController if ($RoleIsDatacenter ... Read more

HAFNIUM: EOMT from Microsoft secures unpatched Exchange Server

Microsoft provides the tool "Exchange On-premises Mitigation Tool (EOMT) to secure unpatched Exchange servers for download: https://github.com/microsoft/CSS-Exchange/tree/main/Security EOMT first secures the Exchange server against the vulnerability CVE-2021-26855 using URL rewrite and then downloads the Microsoft Safty Scanner to check the server for a successful attack. However, EOMT does not install the available updates ... Read more

HAFNIUM: Changed directory permissions prevent update

In the case of successfully attacked Exchange servers with the HAFNIUM exploit, the directory permissions may be changed, resulting in affected Exchange servers reporting an error message when installing updates. Here is an example of a directory where the permissions have been changed: As can be seen in the screenshot, the permissions for the principal ... Read more

HAFNIUM: Small update on the public exploit

The exploit for the Exchange vulnerabilities is now publicly available and, as was to be expected, is spreading even further. Initially, the exploit was blocked on GitHub, which naturally resulted in the exploit being published on various sites. In the meantime, the exploit is also available again on GitHub, only on other ... Read more

HAFNIUM exploit: Microsoft releases updates for older Exchange versions

Due to the severity of the HAFNIUM exploit, Microsoft has released further updates for older Exchange Server versions. However, the updates cannot be obtained via Windows Update, but must be downloaded and installed manually. Further information on the updates can be found here: March 2021 Exchange Server Security Updates for older Cumulative Updates of Exchange Server Some ... Read more