Microsoft Exchange Zero-Day Exploited: No Patch, Only Mitigations

Key Takeaways

- CVE-2026-42897 affects Exchange Server 2016, 2019, and Subscription Edition with no patch available
- Attackers can execute arbitrary JavaScript when victims open malicious emails in Outlook Web Access
- Exchange Emergency Mitigation Service provides automatic protection for servers running March 2023 or newer builds
What the Vulnerability Does
Microsoft disclosed on Thursday that threat actors are actively exploiting a high-severity vulnerability in Exchange Server. The flaw, tracked as CVE-2026-42897, is a spoofing vulnerability that enables cross-site scripting attacks against Outlook Web Access users.
The attack works like this: an attacker sends a specially crafted email to a target. If the recipient opens that email in Outlook Web Access and meets certain interaction conditions, malicious JavaScript executes in their browser. This gives the attacker code execution within the victim's browser session.
The vulnerability affects Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition. All three remain vulnerable even when fully patched with the latest available updates.
No Patch Yet, Only Mitigations
Microsoft has not released a patch. Instead, the company is pushing mitigations through its Exchange Emergency Mitigation Service. EEMS will automatically apply protections to Exchange Server 2016, 2019, and SE installations running on-premises.
“Using EM Service is the best way for your organization to mitigate this vulnerability right away. If you have EM Service currently disabled, we recommend you enable it right away.”
— Microsoft Exchange Team
There's a catch. EEMS cannot check for new mitigations if your server runs an Exchange Server version older than March 2023. Organizations still on older builds need to update first or apply mitigations manually.
Manual Mitigation for Air-Gapped Servers
Administrators running Exchange in air-gapped environments cannot rely on EEMS. Microsoft advises downloading the latest Exchange on-premises Mitigation Tool and running it through an elevated Exchange Management Shell.
For a single server, run:
.\EOMT.ps1 -CVE "CVE-2026-42897"For all servers in the organization:
Get-ExchangeServer | Where-Object { $_.ServerRole -ne "Edge" } | .\EOMT.ps1 -CVE "CVE-2026-42897"When Patches Will Arrive
Microsoft plans to release patches for Exchange SE RTM, Exchange 2016 CU23, and Exchange Server 2019 CU14 and CU15. The company did not provide a timeline.
Here's the bad news for organizations on older Exchange versions. Updates for Exchange 2016 and 2019 will only be available to customers enrolled in the Period 2 Exchange Server Extended Security Updates program. If you haven't paid for ESU coverage, you won't get the patch.
Why EEMS Exists
Microsoft introduced the Exchange Emergency Mitigation Service in September 2021. The feature was a direct response to the ProxyLogon and ProxyShell vulnerabilities that hackers exploited en masse before patches or mitigation guidance existed.
EEMS runs as a Windows service on Exchange Mailbox servers. It's enabled by default on servers with the Mailbox role. When Microsoft identifies a high-risk vulnerability being actively exploited, EEMS can push interim mitigations automatically, buying time until a full patch arrives.
Exchange Security Remains a Persistent Problem
Exchange Server has become a favorite target for threat actors. The product's complexity, its privileged position in enterprise networks, and the large number of internet-exposed instances make it attractive. Many organizations still run on-premises Exchange despite Microsoft's push toward Exchange Online.
In October, weeks after Exchange 2016 and 2019 reached end of support, CISA and the NSA released joint guidance to help IT administrators harden Exchange servers against attacks. That guidance remains relevant for organizations still running these versions.
Another actively exploited zero-day with federal agency involvement
What You Should Do Now
- Verify EEMS is enabled on all Exchange servers. If disabled, enable it immediately.
- Check that your Exchange installation is at least March 2023 version or newer so EEMS can receive mitigation updates.
- For air-gapped servers, download EOMT and run the mitigation script manually.
- If you're running Exchange 2016 or 2019 without ESU enrollment, consider enrolling before the patch drops.
- Monitor Microsoft's security advisories for patch release announcements.
Related security research on rapid exploit development
Logicity's Take
Frequently Asked Questions
Is there a patch available for CVE-2026-42897?
No. Microsoft has only released mitigations through EEMS and EOMT. Patches are planned for Exchange SE RTM, 2016 CU23, and 2019 CU14/CU15, but no release date has been announced.
Which Exchange Server versions are affected?
Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition are all affected, even when running the latest available updates.
How do attackers exploit this vulnerability?
An attacker sends a specially crafted email. When the recipient opens it in Outlook Web Access and certain interaction conditions are met, malicious JavaScript executes in the victim's browser.
Will I get the patch if I'm not enrolled in ESU?
For Exchange 2016 and 2019, patches will only be available to customers enrolled in the Period 2 Exchange Server Extended Security Updates program. Exchange SE customers will receive patches without ESU enrollment.
Does Exchange Emergency Mitigation Service work on all Exchange servers?
EEMS requires Exchange Server versions from March 2023 or newer. Older versions cannot receive new mitigation updates through EEMS.
Need Help Implementing This?
Source: BleepingComputer
Manaal Khan
Tech & Innovation Writer
Related Articles
Browse all
Kraken Crypto Exchange Extortion: Hackers Threaten to Leak Internal Videos After Insider Breach
Cryptocurrency exchange Kraken is being extorted by hackers who obtained videos of internal systems through bribed support employees. The company says no funds were compromised and refuses to pay, with only about 2,000 accounts affected. Kraken is working with federal law enforcement to prosecute everyone involved.

Windows 11 KB5083769 and KB5082052: April 2026 Patch Tuesday Brings Smart App Control Changes and Security Fixes
Microsoft's April 2026 Patch Tuesday updates are now live for Windows 11, bringing critical security patches alongside a welcome change to Smart App Control. You can finally toggle SAC on or off without wiping your entire system. The updates cover versions 23H2, 24H2, and 25H2.

Zero Trust Identity Security: 5 Ways This Framework Actually Stops Credential Theft
Stolen credentials caused 22% of breaches in 2025, making them the top attack vector. Zero Trust promises to fix this, but only when it's built around identity as the core principle. Here's how organizations can implement it properly.
Open Source PR Backlogs: Why Your GitHub Contribution Sits Unreviewed for a Year
A developer's Jellyfin pull request has been waiting over a year for merge despite two approvals, exposing a systemic crisis in open source maintenance. Queuing theory explains why backlogs grow exponentially, and 60% of maintainers have quit or considered quitting due to burnout.
Also Read

Gemini's Scheduled Actions Are Paywalled. Here's Why That Stings
Google's Gemini has a genuinely useful automation feature called Scheduled Actions. It lets you set Gemini prompts to run automatically at specific times. The catch: you need a paid subscription to use it.

Anthropic Leases Musk's Colossus 1 for Claude Inference
Anthropic has struck a deal with SpaceX to lease the entire Colossus 1 data center with over 220,000 GPUs. The AI company will use the capacity to address usage bottlenecks across Claude's paid ecosystem, while Musk prepares a unified Blackwell-only Colossus 2 for frontier training.

3 Things to Know Before Using an Old Phone as a Dashcam
An old smartphone has everything needed to record road footage: camera, storage, and processing power. But turning it into a reliable dashcam requires understanding heat risks, battery degradation, and storage limits that most guides skip over.