{"id":8402,"date":"2021-05-28T13:18:47","date_gmt":"2021-05-28T13:18:47","guid":{"rendered":"https:\/\/www.techmagazines.net\/?p=8402"},"modified":"2021-05-28T13:18:56","modified_gmt":"2021-05-28T13:18:56","slug":"microsoft-exchange-server-vulnerabilities-complete-guide-in-2021","status":"publish","type":"post","link":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/","title":{"rendered":"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack on-premises Microsoft Exchange servers, especially Exchange 2013, 2016, and 2019. The threat groups exploited these vulnerabilities to gain access to the on-premises Exchange servers to deploy web shells. These web shells allow them to steal the data and install malware on the compromised server. The four zero-day vulnerabilities that are being exploited by the Hafnium group were CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and CVE-2021-27065.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_78 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #5ad602;color:#5ad602\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #5ad602;color:#5ad602\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#Microsoft_Exchange_Server_Vulnerabilities\" >Microsoft Exchange Server Vulnerabilities&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#How_to_Check_if_your_MS_Exchange_Server_is_Vulnerable\" >How to Check if your MS Exchange Server is Vulnerable?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#Step_1_Download_Health_Checker_Script\" >Step 1: Download Health Checker Script&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#Step_2_Run_Health_Checker_Script\" >Step 2: Run Health Checker Script&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#Step_3_Run_Exchange_On-Premises_Mitigation_Tool\" >Step 3: Run Exchange On-Premises Mitigation Tool&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#How_to_Protect_your_Exchange_Server\" >How to Protect your Exchange Server?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p>In this guide, we\u2019ll explain these vulnerabilities in detail and the ways to check and fix vulnerabilities in the Exchange server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Microsoft_Exchange_Server_Vulnerabilities\"><\/span>Microsoft Exchange Server Vulnerabilities&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Microsoft provided details to help understand the techniques used by the attackers to exploit these vulnerabilities. Here are the details:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>CVE-2021-26855:<\/strong> This vulnerability is related to server side request forgery (SSRF). It allows the threat groups to send random HTTP requests to make an untrusted connection. To protect against this, you can restrict the untrusted connections or set up VPN to separate your Exchange server from outside access. If your Exchange server is externally facing, it is recommended to install the latest available updates.&nbsp;&nbsp;<\/li><li><strong>CVE-2021-26857:<\/strong> This is an insecure deserialization vulnerability in the MS Exchange server\u2019s Unified Messaging Service. This allows the attackers to deploy an arbitrary code on the Exchange server as SYSTEM. However, it works when the attacker has administrator permissions, i.e. the stolen credentials, or exploited another vulnerability. To fix this, you can restrict the untrusted connections and install the latest security updates on your Exchange server.&nbsp;<\/li><li><strong>CVE-2021-26858: <\/strong>This is post-authentication random file write vulnerability. By exploiting this vulnerability, the attackers can write a file to any path on the Exchange server. They can authenticate by exploiting the SSRF vulnerability or using the stolen admin credentials.&nbsp;You need to install security updates released by Microsoft to patch this vulnerability.<\/li><li><strong>CVE-2021-27065: <\/strong>This vulnerability also allows the attackers write a file to any path on the Exchanger server by using the compromised administrator credentials. To protect your Exchange server, apply the latest security patches released by Microsoft.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Check_if_your_MS_Exchange_Server_is_Vulnerable\"><\/span>How to Check if your MS Exchange Server is Vulnerable?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Microsoft released Exchange Server Health Checker PowerShell script that has proven extremely helpful for Exchange Administrators to check if their Exchange server is vulnerable. This script also allows them to check performance and configuration problems, along with information about the need of Cumulative Updates (CU) or Security Updates (SU).&nbsp;<\/p>\n\n\n\n<p>Here are the steps:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step_1_Download_Health_Checker_Script\"><\/span>Step 1: Download Health Checker Script&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Download the latest release of <strong>HealthChecker.ps1<\/strong>&nbsp;PowerShell script from Github, if you\u2019re using Exchange server 2019, 2016, or 2013. If you are using Exchange 2010, download V2 release on the server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step_2_Run_Health_Checker_Script\"><\/span>Step 2: Run Health Checker Script&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You can run the Health Checker script via Exchange Management Shell (EMS). Follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Open <strong>EMS<\/strong> on your server.&nbsp;<\/li><li>Go to the folder where HealthChecker.ps1 PowerShell script is downloaded.&nbsp;<\/li><li>Enter the command: <strong>.\\HealthChecker.ps1.<\/strong>&nbsp;<\/li><li>This will execute the script in default mode on local server.<\/li><li>If you want to run the script for a specific Exchange server, execute the command: &nbsp;<strong>.\\HealthChecker.ps1 -Server EXCHSRV1.<\/strong><\/li><li>You can see the list of all security vulnerabilities that you need to patch. Apply the latest updates released by Microsoft.&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step_3_Run_Exchange_On-Premises_Mitigation_Tool\"><\/span>Step 3: Run Exchange On-Premises Mitigation Tool&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Microsoft has released Exchange On-Premises Mitigation Tool (EOMT) \u2013 a one click mitigation tool &#8211; for clients who have not installed the security updates on their on-premises Exchange server. It helps mitigate the CVE-2021 26855 vulnerability. Here are the steps to run the EOMT:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download the EOMT tool.<\/li><li>Extract the folder at the desired location.<\/li><li>Open the Exchange Management Shell and go to the location where you\u2019ve extracted the folder.<\/li><li>To check if your Exchange server is vulnerable, run the script: <strong>.\\EOMT.ps1<\/strong>. It downloads and installs the IIS URL rewrite tool.&nbsp;<\/li><li>Then, it downloads and runs the MSERT (Microsoft Security Scanner) in quick scan mode. It removes web shells and threats from the Exchange server.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Protect_your_Exchange_Server\"><\/span>How to Protect your Exchange Server?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You need to install the below-given latest Exchange server updates released by Microsoft.<\/p>\n\n\n\n<p><strong>1. March 2021 Security Updates:<\/strong> You can download the March 2021 Exchange Server Security Update from <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-exchange-server-security-updates\/ba-p\/2175901\">here<\/a> to keep your server secure.&nbsp;<\/p>\n\n\n\n<p><strong>2. April 2021 Security Updates: <\/strong>Microsoft released patches and cumulative updates in April this year to cover 114 common vulnerabilities. You can install these updates to protect your Exchange server from attacks and other security threats. These CUs are:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exchange Server 2019&nbsp;<strong>CU8<\/strong>&nbsp;and&nbsp;<strong>CU9<\/strong><\/li><li>Exchange Server 2016&nbsp;<strong>CU19<\/strong>&nbsp;and&nbsp;<strong>CU20<\/strong><\/li><li>Exchange Server 2013&nbsp;<strong>CU23<\/strong><\/li><\/ul>\n\n\n\n<p><strong>3. May 2021 Security Updates:<\/strong> These recent updates released by Microsoft help you to patch 55 vulnerabilities, including the three zero-day vulnerabilities &#8211; CVE-2021-31207, CVE-2021-31200, and CVE-2021-31204 that were exploited by the Hafnium group.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Hafnium and other threat groups have exploited the Exchange server vulnerabilities to steal data and install malware. The four zero-day vulnerabilities are discussed in detail above. To fix such vulnerabilities, you need to install the latest security updates released by Microsoft.<\/p>\n\n\n\n<p>In case your Exchange server has been compromised or attacked by such threat groups, resulting in server crash or inaccessible database, you can use an <a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\">Exchange recovery software<\/a> such as <strong>Stellar Repair for Exchange<\/strong> to recover mailboxes. The software can recover mailboxes from offline or dismounted database and export them to a live Exchange server. If you want to migrate large Exchange EDB files to PST, then you can try <a href=\"https:\/\/www.stellarinfo.com\/email-repair\/edb-pst-converter.php\">Stellar Converter for EDB<\/a>.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"wpm_excerpt clearfix\"><p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack on-premises Microsoft Exchange servers, especially &hellip;<\/p>\n<\/div>","protected":false},"author":1,"featured_media":8403,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-8402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021 | Tech Magazine<\/title>\n<meta name=\"description\" content=\"In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021 | Tech Magazine\" \/>\n<meta property=\"og:description\" content=\"In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&amp;ref=br_rs\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&amp;ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-28T13:18:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-28T13:18:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amit Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amit Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\"},\"author\":{\"name\":\"Amit Gupta\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"headline\":\"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021\",\"datePublished\":\"2021-05-28T13:18:47+00:00\",\"dateModified\":\"2021-05-28T13:18:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\"},\"wordCount\":936,\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg\",\"articleSection\":[\"Tech News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\",\"url\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\",\"name\":\"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021 | Tech Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg\",\"datePublished\":\"2021-05-28T13:18:47+00:00\",\"dateModified\":\"2021-05-28T13:18:56+00:00\",\"description\":\"In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg\",\"width\":860,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techmagazines.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techmagazines.net\/#website\",\"url\":\"https:\/\/www.techmagazines.net\/\",\"name\":\"Tech Magazines\",\"description\":\"Best Digital Tech Magazines Site\",\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techmagazines.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\",\"name\":\"Amit Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"width\":500,\"height\":125,\"caption\":\"Amit Gupta\"},\"logo\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\"},\"description\":\"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.\",\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs\"],\"url\":\"https:\/\/www.techmagazines.net\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021 | Tech Magazine","description":"In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021 | Tech Magazine","og_description":"In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack","og_url":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/","og_site_name":"Tech Magazine","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs","article_author":"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs","article_published_time":"2021-05-28T13:18:47+00:00","article_modified_time":"2021-05-28T13:18:56+00:00","og_image":[{"width":860,"height":520,"url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg","type":"image\/jpeg"}],"author":"Amit Gupta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amit Gupta","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#article","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/"},"author":{"name":"Amit Gupta","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"headline":"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021","datePublished":"2021-05-28T13:18:47+00:00","dateModified":"2021-05-28T13:18:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/"},"wordCount":936,"publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"image":{"@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg","articleSection":["Tech News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/","url":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/","name":"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021 | Tech Magazine","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg","datePublished":"2021-05-28T13:18:47+00:00","dateModified":"2021-05-28T13:18:56+00:00","description":"In March this year, Microsoft detected multiple zero-day vulnerabilities that were exploited by cyber espionage groups, such as Hafnium, to attack","breadcrumb":{"@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#primaryimage","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2021\/05\/microsoft-issues-mitigation-tool-for-exchange-server-flaw-showcase_image-4-a-16191.jpg","width":860,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/www.techmagazines.net\/microsoft-exchange-server-vulnerabilities-complete-guide-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techmagazines.net\/"},{"@type":"ListItem","position":2,"name":"Microsoft Exchange Server Vulnerabilities: Complete Guide in 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.techmagazines.net\/#website","url":"https:\/\/www.techmagazines.net\/","name":"Tech Magazines","description":"Best Digital Tech Magazines Site","publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techmagazines.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2","name":"Amit Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","width":500,"height":125,"caption":"Amit Gupta"},"logo":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/"},"description":"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.","sameAs":["https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs"],"url":"https:\/\/www.techmagazines.net\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/8402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/comments?post=8402"}],"version-history":[{"count":1,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/8402\/revisions"}],"predecessor-version":[{"id":8404,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/8402\/revisions\/8404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media\/8403"}],"wp:attachment":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media?parent=8402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/categories?post=8402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/tags?post=8402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}