{"id":934,"date":"2021-04-14T11:59:32","date_gmt":"2021-04-14T16:59:32","guid":{"rendered":"https:\/\/itblog.ldlnet.net\/?p=934"},"modified":"2021-04-15T12:31:15","modified_gmt":"2021-04-15T17:31:15","slug":"released-april-2021-exchange-server-security-updates","status":"publish","type":"post","link":"https:\/\/itblog.ldlnet.net\/index.php\/2021\/04\/14\/released-april-2021-exchange-server-security-updates\/","title":{"rendered":"Released: April 2021 Exchange Server Security Updates"},"content":{"rendered":"\n<p>Microsoft has released security updates for vulnerabilities found in:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exchange Server 2013<\/li><li>Exchange Server 2016<\/li><li>Exchange Server 2019<\/li><\/ul>\n\n\n\n<p>These updates are available for the following specific builds of Exchange Server:<\/p>\n\n\n\n<p class=\"has-medium-pink-color has-text-color has-small-font-size\"><strong>IMPORTANT:<\/strong>&nbsp;If manually installing security updates, you&nbsp;<em>must<\/em>&nbsp;install .msp from elevated command prompt (see Known Issues in update KB article).<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exchange Server 2013&nbsp;<strong><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D103000&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031704819%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=sKGy%2BHIF7hr6h%2FZUI9HDX3DbhxTxcNvE5k1j9o01upA%3D&amp;reserved=0\">CU23<\/a><\/strong><\/li><li>Exchange Server 2016<strong>&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D103001&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031704819%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=y8hG%2F2xgiklvO8rZTaR9itvGp7%2FPx8gtbq8E24gWc5E%3D&amp;reserved=0\">CU19<\/a><\/strong>&nbsp;and<strong>&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D103002&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031714815%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=5kc64PJGoFvKZHASo9Ua0xVoF6tdlTh16TvXdOFgu5k%3D&amp;reserved=0\">CU20<\/a><\/strong><\/li><li>Exchange Server 2019&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D103003&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031724807%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=UJ93%2B0B5Vg91QzCMPDt9YcHGnxlC0UNHJcfAhbGR%2BWE%3D&amp;reserved=0\"><strong>CU8<\/strong><\/a>&nbsp;and&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D103004&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031734805%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=C7oJtVFPxuHE0eF4l1jIwbYoWS6B9%2FS6JzGVZwXMhg8%3D&amp;reserved=0\"><strong>CU9<\/strong><\/a><\/li><\/ul>\n\n\n\n<p>Vulnerabilities addressed in the April 2021 security updates were responsibly reported to Microsoft by a security partner. Although we are not aware of any active exploits in the wild, our recommendation is to install these updates immediately to protect your environment.<\/p>\n\n\n\n<p>These vulnerabilities affect Microsoft Exchange Server. Exchange Online customers are already protected and do not need to take any action.<\/p>\n\n\n\n<p>For additional information, please see the&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Faka.ms%2FApril2021SecUpdate&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031734805%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=2%2FSfBjYm29ODZQ3yxnXitTVYpuv4My5uMEB57X%2FlbgE%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Response Center (MSRC) blog<\/a>. More details about specific CVEs can be found in&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2F&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031744807%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=J8IDRPxZRJ4iFeqTF8frVERFoWCXBUc9c14tW%2BKgjF8%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Security Update Guide<\/a>&nbsp;(filter on Exchange Server under Product Family).<\/p>\n\n\n\n<p>Two update paths are:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"286\" src=\"https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2021\/04\/CU9-AprilUpdate.jpg\" alt=\"\" class=\"wp-image-935\" srcset=\"https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2021\/04\/CU9-AprilUpdate.jpg 999w, https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2021\/04\/CU9-AprilUpdate-300x86.jpg 300w, https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2021\/04\/CU9-AprilUpdate-768x220.jpg 768w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\" \/><figcaption>Update Path<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"toc-hId--495590979\">Inventory your Exchange Servers<\/h2>\n\n\n\n<p>Use the&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Faka.ms%2FExchangeHealthChecker&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031754793%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=lULxZ7hW%2B3ygxHEfT3cUxjHPLcUbiwKW2IslyDGDgS0%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Exchange Server Health Checker script<\/a>, which can be downloaded from GitHub (use the latest release), to inventory your servers. Running this script will tell you if any of your Exchange Servers are behind on updates (CUs and SUs).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"toc-hId-1991921854\">Update to the latest Cumulative Update<\/h2>\n\n\n\n<p>Go to&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Faka.ms%2FExchangeUpdateWizard&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031754793%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=%2BbPl8bbXz89zSjaYdQY9Q2hifvG3tK2Q%2FWBNbFrnR64%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/ExchangeUpdateWizard<\/a>&nbsp;and choose your currently running CU and your target CU. Then click the \u201cTell me the steps\u201d button, to get directions for your environment.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"263\" height=\"147\" src=\"https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2021\/04\/CU9-AprilUpdate2.jpg\" alt=\"\" class=\"wp-image-936\"\/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"toc-hId-184467391\">If you encounter errors during or after installation of Exchange Server updates<\/h2>\n\n\n\n<p>Make sure to follow the&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Faka.ms%2FExchangeUpdateWizard&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031764791%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=PNP8u4Z3jAjj995NyUDHLyrCfbKwPpwOg80DQYg7vE0%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">ExchangeUpdateWizard<\/a>&nbsp;instructions and&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2FExchange%2Fplan-and-deploy%2Finstall-cumulative-updates&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031774788%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=75%2BQtAcVo4mh55NkbS24HhLdZGtSujIRb7kJdv0XD5Q%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">best practices for installation of updates<\/a>&nbsp;carefully, including when to install using elevated command prompt. If you encounter errors during or after installation, see&nbsp;<a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fexchange%2Ftroubleshoot%2Fclient-connectivity%2Fexchange-security-update-issues&amp;data=04%7C01%7Cgeraldr%40microsoft.com%7Ce52904ee4f1d40e1751508d8fea09ad3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637539313031774788%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=wIGDMFGW%2B8ZYjJkBnPiKUtIXO0dOe03kdn81kqD8DmQ%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Repair failed installations of Exchange Cumulative and Security updates<\/a>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"toc-hId-173964287\">FAQs<\/h1>\n\n\n\n<p><em><strong>My organization is in Hybrid mode with Exchange Online. Do I need to do anything?<\/strong><\/em><br>While Exchange Online customers are already protected, the April 2021 security updates do need to be applied to your on-premises Exchange Server, even if it is used only for management purposes. You do&nbsp;<em>not<\/em>&nbsp;need to re-run the Hybrid Configuration Wizard (HCW) after applying updates.<\/p>\n\n\n\n<p><em><strong>Do the April 2021 security updates contain the March 2021 security updates for Exchange Server?<\/strong><\/em><br>Yes, our security updates are cumulative. Customers who installed the March 2021 security updates for supported CUs can install the April 2021 security updates and be protected against the vulnerabilities that were disclosed during both months. If you are installing an update manually, do not double-click on the .msp file, but instead run the install from an elevated CMD prompt.<\/p>\n\n\n\n<p><em><strong>Is Microsoft planning to release April 2021 security updates for older (unsupported) versions of Exchange CUs?<\/strong><\/em><br>No, we have no plans to release the April 2021 security updates for older or unsupported CUs. In March, we took unprecedented steps and released SUs for unsupported CUs because there were active exploits in the wild. You should update your Exchange Servers to supported CUs and then install the SUs. There are 47 unsupported CUs for the affected versions of Exchange Server, and it is not sustainable to release updates for all of them. We strongly recommend that you keep your environments current.<\/p>\n\n\n\n<p><em><strong>Can we use March 2021 mitigation scripts (like EOMT) as a temporary solution?<\/strong><\/em><br>The vulnerabilities fixed in the April 2021 updates are different from those we fixed before. Therefore, running March 2021 security tools and scripts will&nbsp;<em>not<\/em>&nbsp;mitigate the vulnerabilities fixed in April 2021. You should update your servers as soon as possible.<\/p>\n\n\n\n<p><em><strong>Do I need to install the updates on \u2018Exchange Management Tools only\u2019 workstations?<\/strong><\/em><strong><em><br><\/em><\/strong>Servers or workstations running only Microsoft Exchange Management Tools (no Exchange services) do not need to apply these updates.<\/p>\n\n\n\n<p><em><strong>Why are there security updates two months in a row?<\/strong><\/em><br>Microsoft regularly releases Exchange Server security updates on \u2018patch Tuesday\u2019. We are always looking for ways to make Exchange Server more secure. You should expect us to continue releasing updates for Exchange Server in the future. The best way to be prepared for new updates is to keep your environment current.<\/p>\n\n\n\n<p><em><strong>Is there no update for Exchange Server 2010?<\/strong><\/em><strong><em><br><\/em><\/strong>No, Exchange 2010 is not affected by the vulnerabilities fixed in the April 2021 security updates.<\/p>\n\n\n\n<p><em><strong>Is there a specific order of installation for&nbsp;the April 2021 security updates?<\/strong><\/em><br>We recommend that you update all on-premises Exchange Servers with the April 2021 security updates using your usual update process.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong><em>REFERENCES:<\/em><\/strong><br><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-april-2021-exchange-server-security-updates\/ba-p\/2254617\">Released: April 2021 Exchange Server Security Updates &#8211; Microsoft Tech Community<\/a><br><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/04\/13\/april-2021-update-tuesday-packages-now-available\/\">April 2021 Update Tuesday packages now available \u2013 Microsoft Security Response Center<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released security updates for vulnerabilities found in: Exchange Server 2013 Exchange Server 2016 Exchange Server 2019 These updates are available<\/p>\n<p class=\"link-more\"><a class=\"myButt \" href=\"https:\/\/itblog.ldlnet.net\/index.php\/2021\/04\/14\/released-april-2021-exchange-server-security-updates\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":939,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,2,266],"tags":[9,150,149,151,148,268],"class_list":["post-934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exchange","category-general","category-security-and-compliance","tag-exchange","tag-exchange-2013","tag-exchange-2016","tag-exchange-2019","tag-exchange-upgrade","tag-security","odd"],"_links":{"self":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/comments?post=934"}],"version-history":[{"count":3,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/934\/revisions"}],"predecessor-version":[{"id":940,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/934\/revisions\/940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media\/939"}],"wp:attachment":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media?parent=934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/categories?post=934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/tags?post=934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}