The Exchange product group released November updates for Exchange Server 2016 and 2019.
The vulnerabilities addressed in these Security Updates for Exchange Server are:
| Vulnerability | Category | Severity | Rating |
|---|---|---|---|
| CVE-2023-36439 | Remote Code Execution | Important | CVSS:3.1 8.0 / 7.0 |
| CVE-2023-36050 | Spoofing | Important | CVSS:3.1 8.0 / 7.0 |
| CVE-2023-36039 | Spoofing | Important | CVSS:3.1 8.0 / 7.0 |
| CVE-2023-36035 | Spoofing | Important | CVSS:3.1 8.0 / 7.0 |
The Security Updates for each supported Exchange Server build are linked below:
| Exchange | Download | Build | KB | Supersedes |
|---|---|---|---|---|
| Exchange 2019 CU13 | Download | 15.2.1258.28 | KB5032146 | KB5030877 |
| Exchange 2019 CU12 | Download | 15.2.1118.40 | KB5032146 | KB5030877 |
| Exchange 2016 CU23 | Download | 15.1.2507.35 | KB5032147 | KB5030877 |
Payload Serialization Signing
Be advised that these updates will enable payload signing by default. Payload serialization signing signs PowerShell payloads to identify possible tampering. Support for certificate-based signing of PowerShell serialization payloads got added with January security updates and is a per-server configuration. In other words, make sure you have deployed the January security updates before implementing these security updates, so your Exchange servers support payload signing before you can enable it one server at a time.
More info on the topic here. The process is explained at https://aka.ms/HC-SerializedDataSigning. To verify or configure signing, use the script published here or follow the manual steps. Signing leverages the organization-wide available Exchange Auth Certificate, which needs to be present and valid; the MonitorExchangeAuthCertificate.ps1 script can help you verify this.
Fixed Issues
Apart from security fixes, these Security Updates also correct the following issues:
| Issue Fixed | Exchange 2016 | Exchange 2019 |
|---|---|---|
| Signing of the serialisation payload fails to run the few cmdlets | Yes | Yes |
| Unable to migrate mailbox as communication error parameter exception occurs | Yes | Yes |
| InvalidResponseException when you try to run Export-UMPrompt | Yes |
Notes
- Security updates are Cumulative Update level specific. You cannot apply the update for Exchange 2019 CU13 to Exchange 2019 CU12. When downloading, the security update will carry the same name for different Cumulative Updates, and I would suggest tagging the file name with the CU level when archiving it, e.g., Exchange2019-CU13-KBXXXXXX-x64-en.msp.
- Similar to Cumulative Updates, Security Updates are cumulative, and you only need to install the latest SU for your CU.
- If you have deployed Exchange Management Tools to manage your on-premises Exchange Servers or installed the tools after removal of the Last Exchange Server for recipient management, it is recommended to apply the Security Update. Be aware of few cmdlet piping issues mentioned here.
On a final note, as with any patch or update, it is recommended to apply this in a test environment first prior to implementing it in production. However, it is not recommended to wait for regular maintenance cycles when it concerns security updates and follow a more agile approach; the ratings are an indication of the urgency.
