Blog Post

Exchange Team Blog
5 MIN READ

Released: October 2023 Exchange Server Security Updates

The_Exchange_Team's avatar
The_Exchange_Team
Platinum Contributor
Oct 10, 2023

Microsoft has released Security Updates (SUs) for vulnerabilities found in:

  • Exchange Server 2019
  • Exchange Server 2016

SUs are available for the following specific versions of Exchange Server:

  • Exchange Server 2019 CU12 and CU13
  • Exchange Server 2016 CU23

The October 2023 SUs address vulnerabilities responsibly reported to Microsoft by security partners and found through Microsoft’s internal processes. Although we are not aware of any active exploits in the wild, our recommendation is to immediately install these updates to protect your environment.

These vulnerabilities affect Exchange Server. Exchange Online customers are already protected from the vulnerabilities addressed by these SUs and do not need to take any action other than updating any Exchange servers or Exchange Management tools workstations in their environment.

More details about specific CVEs can be found in the Security Update Guide (filter on Exchange Server under Product Family).

CVE-2023-21709 now has a better solution: install update for CVE-2023-36434

During the release of August 2023 SUs, we recommended to use a manual or scripted solution and disable the IIS Token Cache module as a way of addressing CVE-2023-21709. Today, Windows team has released the IIS fix for root cause of this vulnerability, in the form of fix for CVE-2023-36434. We recommend installing the IIS fix after which you can re-enable Token Cache module on your Exchange servers.

If you did not do anything to address CVE-2023-21709 yet:

If you have followed our August 2023 recommendation and disabled the Token Cache module (either by using single-line command or our CVE-2023-21709.ps1 script), or want to address possible performance concerns you have seen since disabling the module, do the following:

  • Install update for CVE-2023-36434 on all your Exchange Servers.
  • Re-enable IIS Token Cache module by doing one of the following:
    • To enable Token Cache module on individual server only, run the following from the elevated PowerShell window:

New-WebGlobalModule -Name "TokenCacheModule" -Image "%windir%\System32\inetsrv\cachtokn.dll"

    • To enable Token Cache module on all servers in the organization (after Windows Updates were installed), you can use our CVE-2023-21709.ps1 as Administrator in Exchange Management Shell (EMS):

.\CVE-2023-21709.ps1 -Rollback

We are making updates to all related August 2023 documentation pages and scripts as well as Health Checker to reflect our new recommendation.

Update installation

The following update paths are available:

Known issues with this release

  • There are no known issues with this update.

Issues resolved in this release (see KB for full list)

FAQs

We are running a non-English operating system, and the October 2023 SU fails with an "Error 0x80070534: failed to get sid for account: Network Service" error. Help!
As outlined in Re-release of August 2023 Exchange Server Security Update packages, it is crucial to uninstall the August 2023 SUv1 and revert the workaround prior installing the October 2023 SU. If you are unsure if/which August 2023 update package you run, make sure to run the latest version of the Exchange Health Checker script first and keep an eye out for the following warning which indicates that the August 2023 SUv1 package is installed: "Error: August 2023 SU 1 Problem Detected. More Information: https://aka.ms/HC-Aug23SUIssue".

We disabled IIS Token Cache as a part of August 2023 update. Does Exchange require IIS Token Cache to run? Must we re-enable it?
Re-enabling IIS Token Cache after installing the update for CVE-2023-36434 is optional. Exchange Server does not require IIS Token Cache. We wanted to call the CVE-2023-36434 update because we heard from some customers who had concerns about performance of their clients after IIS Token Cache is disabled. If you already disabled IIS Token Cache and want to keep it disabled, Exchange Server does not require it. But please make sure to install all Windows Updates anyway. 

Our organization is in Hybrid mode with Exchange Online. Do we need to do anything?
Exchange Online is already protected, but this SU needs to be installed on your Exchange servers, even if they are used only for management purposes. If you change the auth certificate after installing an SU, you should re-run the Hybrid Configuration Wizard.

The last SU we installed is a few months old. Do we need to install all SUs in order to install the latest one?
SUs are cumulative. If you are running a CU supported by the SU, you do not need to install all SUs in sequential order; simply install the latest SU. Please see this blog post for more information.

Do we need to install SUs on all Exchange Servers within our organization? What about ‘Management Tools only’ machines?
Our recommendation is to install SUs on all Exchange Servers and all servers and workstations running the Exchange Management Tools to ensure compatibility between management tools clients and servers. If you are trying to update the Exchange Management Tools in the environment with no running Exchange servers, please see this.

Documentation may not be fully available at the time this post is published.

Updates to this blog post:

  • 10/12/23: Added a note that additional steps might be necessary to address password prompts in multi-forest deployments (issues resolved section)
  • 10/11/23: Added a FAQ for setup error that can be encountered if August 2023 SUv1 was installed on Exchange running on non-English OS
  • 10/11/23: Added a FAQ clarifying that re-enabling IIS Token Cache is not required but is optional

The Exchange Server Team

Updated Oct 12, 2023
Version 8.0

58 Comments

  • LukasSMSFTWe had been holding out on the August SU until the fixed version was available. We haven't performed the manual steps that were listed as a workaround between the first and second version of the update.

  • Hi Nino,

    we're facing the same problems reported back in August on a German Exchange 2016 installation.

    In the setup log files at C:\Program Files\Microsoft\Exchange Server\V15\Logging\Update\msi\ExchangeUpdate-....log we found the following entry:

    ExecSecureObjects: Error 0x80070534: failed to get sid for account: Network Service

    Is this really the same issue like in August? We have not used the temporary workaround mentioned in august (manually creating a user named "Network Service"). Do folks who have successfully installed the October update on a German system still have the manually created account?

    Regards,

    Dennis

  • fw888888 that's correct. The fix for CVE-2023-36434 is a Windows Security Update as it affects a component of IIS which is part of Windows. After the update has been installed, the TokenCacheModul can be added back as described in this blog post. 

  • fw888888's avatar
    fw888888
    Copper Contributor

    Install update for https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434 on all your Exchange Servers.

    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434 is KB5031362,which is monthly security update as well.

    So I just need to run windows update to get the hotfix from WSUS, let windows update install by himself, then Re-enable IIS Token Cache module, right?

    Thanks in advanced.

  • Sam_T's avatar
    Sam_T
    Iron Contributor

    The_Exchange_Team 

    From KB5030877 "Description of the security update for Microsoft Exchange Server 2019, 2016, and 2013: October 10, 2023"    Exchange 2013 ?

    https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-october-10-2023-kb5030877-ec769ff1-f60f-411e-a7ed-b63b42a686eb 

  • Julian_Haupt's avatar
    Julian_Haupt
    Brass Contributor

    Works as expected on German Exchange 2016 CU23 w/ Windows Server 2016. Thanks.