NSA uncovers new "critical" flaws in Microsoft Exchange Server

Federal government orders all agencies to install fixes as the FBI scrambles to remove backdoors

The White House is the daytime

Microsoft released three new patches for its Exchange Server software on Tuesday after the National Security Agency (NSA) alerted the company to a fresh batch of critical vulnerabilities.

The new fixes are for three versions of Exchange Server - 2013, 2016 and 2019 - and the flaws are said to be different vulnerabilities to the ones disclosed in March. However, US agencies continue to find and remove vulnerabilities in their systems a month after the previous flaws were first discovered

In response to the release of new fixes, the White House ordered all its agencies to install them, warning that the vulnerabilities "pose an unacceptable risk" to Federal operations. 

Microsoft's Exchange Server email and calendar software is mostly used in on-premise data centres. The popularity of the system was highlighted by the number of reported breaches the followed the discovery of the initial flaws. 

"Microsoft released a set of Exchange patches today that are critical," a White House statement read. "We urge all owners and operators of Microsoft Exchange Servers to apply these latest patches immediately. The US government will lead by example - we are requiring all agencies to immediately patch their Exchange servers, as well."

Related Resource

The business guide to ransomware

Everything you need to know to keep your company afloat

The business guide to ransomware - whitepaper from DattoDownload now

Exchange Server vulnerabilities have caused issues for a number of organisations around the world, with many servers having already been breached and still vulnerable via embedded back doors. China state-sponsored hacking group Hafnium was spotted by Microsoft using the vulnerability to break into Exchange Servers to view or steal contents. 

These vulnerabilities were patched by Microsoft, but backdoors embedded in breached servers were not closed. Within a few days, other hacking groups began hitting compromised servers with the same flaws to deploy ransomware.

As a result, a US court has had to authorise an FBI operation to "copy and remove" backdoors from hundreds of Exchange Servers. The Justice Department said the operation was "successful", but it only removed backdoors and did not patch the vulnerabilities exploited by the hackers or remove any malware that may have been left behind.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
Best free malware removal tools 2021
Security

Best free malware removal tools 2021

5 May 2021
Acuant acquires identity verification provider Hello Soda
mergers and acquisitions

Acuant acquires identity verification provider Hello Soda

4 May 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021