CISA, Partners Act on Critical Microsoft Exchange Vulnerabilities

▼ Summary
– US CISA and NSA partnered with international agencies to outline security best practices for on-premises Microsoft Exchange Server users.
– Microsoft has released final security updates for Exchange Server 2016 and 2019, leaving many organizations vulnerable without mitigation steps.
– CISA recommends migrating to Exchange Server Subscription Edition or alternative email solutions for unsupported versions.
– Security measures include keeping servers off the public internet, isolating networks, and using email gateways for external communication.
– Experts criticize Microsoft’s security posture, noting customers are locked into its ecosystem, passing risk and expense to them.
The US Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA) and international cybersecurity partners, has issued critical guidance for organizations using on-premises Microsoft Exchange Server. This coordinated advisory arrives as Microsoft concludes the distribution of perpetual security updates for Exchange Server 2016 and 2019, leaving countless systems exposed to sophisticated cyber threats if protective measures are not implemented immediately.
Microsoft Exchange servers represent a frequent and attractive target for malicious actors. With the final security patches now released, a significant vulnerability window has opened for businesses worldwide. CISA strongly recommends a series of defensive actions, including restricting administrative access, enforcing multifactor authentication, configuring strict transport security, and adopting zero trust architecture principles. These steps are designed to substantially harden an organization’s security posture against potential intrusions.
The urgency of the situation is underscored by a recent warning from Germany’s Federal Office for Information Security (BSI). Their analysis revealed a startling statistic: approximately 92% of the 33,000 on-premises Exchange servers in Germany continue to operate on Outlook Web Access 2019 or older versions. These vulnerable systems are not confined to corporate entities; they also support a vast array of critical services, including hospitals, medical practices, educational institutions, law firms, and local government utilities.
For entities running unsupported versions of Exchange, the primary recommendation from CISA and its partners is to migrate. Organizations should transition to the Exchange Server Subscription Edition (SE), which is presently the sole on-premises version receiving ongoing support, or consider moving to a different, fully supported email server platform or cloud service. Microsoft is providing extended security updates for Exchange 2016 and 2019 to facilitate this migration, though it is crucial to note this program only covers critical flaws and will terminate completely on April 14, 2026.
For those organizations that must temporarily continue operating an unsupported Exchange Server, CISA outlines specific mitigation strategies to reduce risk. Key measures include taking Exchange Server instances off the public internet, isolating them within a dedicated network segment, and, if external communication is necessary, routing all traffic through a separate, supported email security gateway.
While the published document offers essential security best practices, CISA clarifies it is not an exhaustive hardening guide. The agency further urges all organizations to maintain active monitoring for signs of compromise and to develop robust incident response and recovery plans. Nick Andersen, Executive Assistant Director for the Cybersecurity Division at CISA, added that evaluating cloud-based email services could help organizations avoid the complexities and security burdens of managing their own on-premises communication infrastructure.
The unusual nature of this international intervention has drawn commentary from security experts. AJ Grotto, a research scholar at Stanford University’s Center for International Security and Cooperation and a former Senior White House Director for Cyber Policy, observed that it is rare for a coalition of security and intelligence agencies to feel compelled to issue such detailed operational guidance for a commercial product. He stated that this action serves as a “devastating commentary on Microsoft’s security posture,” suggesting the company leverages its dominant market position to transfer risk and associated costs onto its locked-in customer base, a situation he described as “not a good look” for the tech giant.
(Source: HelpNet Security)



