On March 2, 2021 Microsoft released a number of critical security updates for Exchange. These are not just a number of new Security Updates, but these are Security Updates for a zero-day vulnerability and as such rated as ‘critical’.
An additional problem here is that the exploit has already been detected in the wild, so all internet facing Exchange servers are vulnerable. These vulnerabilities are used as part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. This means that any malicious person that can access your Exchange server can try to exploit these vulnerabilities.
It is (very) strongly recommended to patch your Exchange servers immediately and not to wait until the next Cumulative Update is released. To stress the importance of this issue, Microsoft organized webcasts about this, and they were broadcasted in APAC and EMEA, most likely the Americas will follow. Handout of the webcast is available on https://aka.ms/ExOOB.
A few remarks about this issue and the Security Updates:
More information can be found on:
Zero Day Vulnerabilities Discovered in all Versions of Microsoft Exchange Server | Jaap Wesselius
Released: March 2021 Exchange Server Security Updates - Microsoft Tech Community
Multiple Security Updates Released for Exchange Server – Microsoft Security Response Center
HAFNIUM targeting Exchange Servers with 0-day exploits - Microsoft Security
Do you have numerous Exchange servers that need to be patched? Understanding the version and patch you are currently running enables you to access the security risk in your environment and ensure the patch was successfully installed. Our ENow developers put together a custom PowerShell script that can be run directly in ENow PowerShell wizard and returns back the information needed to understand what version your servers are running and if the security patch was successful (ps -don’t forget to reboot your server after applying the patch).