Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers

May 15, 2026

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

May 15, 2026

China-Linked Hackers Deploy New TencShell Malware Against Manufacturer

May 15, 2026
Facebook X (Twitter) Instagram
Friday, May 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers
News

Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers

Team-CWDBy Team-CWDMay 15, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Microsoft has warned of a high-severity zero-day vulnerability that could lead to an attacker sending arbitrary code to a victim by sending a specially crafted email to an Outlook user.

The flaw, tracked as CVE-2026-42897, is due to an improper neutralization of input during web page generation – also called cross-site scripting (XSS) – in Microsoft Exchange Server that allows an unauthorized attacker to perform spoofing over a network.

This high-severity vulnerability (CVSS rating of 8.1), disclosed by the tech giant on May 14, is affecting some on-premises Exchange Server versions:

  • All existing Exchange Server 2016 versions
  • All existing Exchange Server 2019 versions
  • All existing Exchange Server Subscription Edition (SE) versions

It does not impact Exchange Online.

Temporary Fixes Available While Patch Is in Development

Microsoft has not yet released a patch for this vulnerability.

However, in a security advisory published on May 14, the Exchange Team shared two approaches security teams can take to mitigate the impact of potential exploits of this vulnerability before patches are available.

The first option, which Microsoft recommends, uses the Exchange Emergency Mitigation (EM) Service.

If the EM Service is enabled, which it is by default, the mitigation has already been automatically applied.

Administrators can verify this by:

  • Checking the applied mitigations for CVE-2026-42897 (M2.1.x) through the documentation
  • Running the Exchange Health Checker script to quickly check the status of EM Service and applied mitigations
  • Enabling the EM Service if it is currently disabled, as Microsoft strongly recommends doing so

Note that servers running versions older than March 2023 cannot receive new mitigations through this service.

The second mitigation option is intended for environments unable to use the EM Service, such as disconnected or air-gapped environments.

Administrators can manually apply the mitigation by:

  • Downloading the latest version of the Exchange On-premises Mitigation Tool (EOMT)
  • Running the provided PowerShell script from an elevated Exchange Management Shell, targeting either a single server or all servers at once using the CVE-2026-42897 identifier

Microsoft acknowledged that both mitigation measures can cause issues, such as disabling or disrupting features (e.g. OWA Print Calendar, Inline images).

The company is working on security patches for impacted Exchange servers.

The Exchange SE update will be released as a publicly available security update, while updates for Exchange 2016 and 2019 will be released only to customers who are enrolled in the Period 2 Exchange Server ESU program.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux
Team-CWD
  • Website

Related Posts

News

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

May 15, 2026
News

China-Linked Hackers Deploy New TencShell Malware Against Manufacturer

May 15, 2026
News

Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.