The Exchange product group released June updates for Exchange Server 2016 and 2019.
Note: Missing Exchange 2013? Its support ended April, 2023. Recommendation is to upgrade to a more recent version, or move to Exchange Online.
The vulnerabilities addressed in these Security Updates for Exchange Server are:
| Vulnerability | Category | Severity | Rating |
|---|---|---|---|
| CVE-2023-32031 | Remote Code Execution | Important | CVSS:3.1 8.8 / 7.7 |
| CVE-2023-28310 | Remote Code Execution | Important | CVSS:3.1 8.0 / 7.0 |
The Security Updates for each supported Exchange Server build are linked below:
| Exchange | Download | Build | KB | Supersedes |
|---|---|---|---|---|
| Exchange 2019 CU13 | Download | 15.2.1258.16 | KB5026261 | KB5024296 |
| Exchange 2019 CU12 | Download | 15.2.1118.30 | KB5026261 | KB5024296 |
| Exchange 2016 CU23 | Download | 15.1.2507.27 | KB5025903 | KB5024296 |
Other Issues
Apart from security fixes, these SU’s also fix the following:
Notes:
- Security updates are Cumulative Update level specific. You cannot apply the update for Exchange 2019 CU12 to Exchange 2019 CU11. When downloading, the security update will carry the same name for different Cumulative Updates, and I would suggest tagging the file name with the CU level when archiving it, e.g. Exchange2019-CU13-KBXXXXXX-x64-en.msp.
- Similar to Cumulative Updates, Security Updates are cumulative and you only need to install the latest SU for your CU.
- Exchange servers running as part of hybrid deployment are managed through PowerShell, and thus need to be receive this patch and eventually be enabled for payload signing.
- If you have installed the Exchange Management Tools separately for managing your on-premises Exchange Servers, or installed it after removal of the Last Exchange Server for recipient management, it is recommended to apply the Security Update.
On a final note, as with any patch or update, I’d recommend to apply this in a test environment first, prior to implementing it in production. However, it is not recommended to wait for regular maintenance cycles when it concerns security updates, and follow a more agile approach; the ratings are an indication of the urgency.

You must be logged in to post a comment.