The Exchange product group released the February 2026 Security Updates for Exchange Server SE, Exchange 2019, and Exchange 2016. There were no updates released in January, so if you missed those, you didn’t. The SE SU is available to the public. Security updates for Exchange 2019 and Exchange 2016 will be available to organizations enrolled in the Extended Security Update program.
The vulnerabilities addressed in these Security Updates for Exchange Server are:
| Vulnerability | Category | Severity | Rating |
|---|---|---|---|
| CVE-2026-21527 | Spoofing | Important | CVSS:3.1 6.5 / 5.7 |
The Security Updates for each supported Exchange Server build are linked below:
| Exchange | SU/HU | Download | Build | KB | Supersedes |
|---|---|---|---|---|---|
| Exchange SE | 5 | Download | 15.2.2562.37 | KB5074992 | KB5071876 |
| Exchange 2019 CU15 | 7 | ESU Program | 15.2.1748.43 | KB5074993 | KB5071875 |
| Exchange 2019 CU14 | 10 | ESU Program | 15.2.1544.39 | KB5074994 | KB5071874 |
| Exchange 2016 CU23 | 21 | ESU Program | 15.1.2507.66 | KB5074995 | KB5071873 |
Notes
- Security updates are Cumulative Update level specific. You cannot apply the Exchange 2019 CU15 update to Exchange 2019 CU14. When downloading, the security update might carry the same name for different Cumulative Updates. Nowadays, Microsoft adds the KB article number as a reference, but I would still tag the file name with the CU level for archival purposes, e.g., Exchange2019-CU15-KBxxxxxxx-x64-en.exe.
- Like Cumulative Updates, Security Updates are cumulative, and you only need to install the latest SU for your CU.
- Suppose you have deployed Exchange Management Tools to manage your on-premises Exchange Servers or installed the tools after removing the Last Exchange Server for recipient management. In that case, it is recommended that you apply the Security Update.
On a final note, as with any patch or update, it is recommended that you test it in a test environment before deploying it to production. However, it is not recommended to wait for regular maintenance cycles for security updates; a more agile approach is preferable, and the ratings indicate the level of urgency.
