{"id":162533,"date":"2024-02-16T11:19:49","date_gmt":"2024-02-16T11:19:49","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=162533"},"modified":"2025-06-17T08:57:05","modified_gmt":"2025-06-17T08:57:05","slug":"microsoft-new-critical-exchange-bug-exploited-as-zero-day","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/","title":{"rendered":"Microsoft New Critical Exchange Bug Exploited as Zero-Day"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>Microsoft has identified a zero-day vulnerability in Exchange Server, which attackers are already exploiting. At the time of releasing February&rsquo;s Patch Tuesday update, Microsoft has internally tracked the CVE-2024-21410 vulnerability that impacts the elevation privilege on the vulnerable Exchange Servers. This zero-day vulnerability primarily impacts Exchange Server 2016 and 2019. The vulnerability allows the threat actors to force network devices, including domain controllers and servers, to authenticate against a <strong>New Technology LAN Manager (NTLM)<\/strong> relay server, controlled by them, to imitate the targeted devices and elevate the privileges. NTLM protocol is normally used for authentication, integrity, and confidentiality of the Active Directory\/Exchange Server mailboxes.<\/p><p>By exploiting the vulnerability, the attackers target NTLM clients, such as Outlook, to gain access to the victim&rsquo;s credentials. These leaked credentials are then used to gain privileges as the victim and to perform operations on the Exchange Server on the victim&rsquo;s behalf. This means that a successful attacker can impersonate the user using the Net-NTLMv2 hash. The attackers can get access through a user who has admin access to the Exchange Server and modify the configuration or leak the data. If data is compromised, the impacted organizations can also face legal actions for not protecting the services and data of the clients.<\/p><h2 class=\"wp-block-heading\" id=\"how-to-mitigate-or-protect-against-this-new-vulnerability?\"><strong>How to Mitigate or Protect against this New Vulnerability?<\/strong><\/h2><p>You need to enable the NTLM credentials Relay Protections, also called <strong>Extended Protection for Authentication (EPA)<\/strong>, to address the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21410\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-21410<\/a> vulnerability. The Extended Protection (EP) is a protocol that is used to strengthen the Windows Server authentication functionality, thus mitigating such attacks.<\/p><p>For Exchange Server 2019, you can install the 2024 H1 Cumulative Update or CU 14, released by Microsoft on Patch Tuesday (on February 13, 2024). In this update, Microsoft has announced that the Exchange Extended Protection Management (EP) is automatically enabled in the CU 14 and onwards.<\/p><p>However, in previous Cumulative Updates of Exchange Server 2019, the New Technology LAN Manager (NTLM) credentials Relay Protections were not enabled by default. So, you need to install the latest Cumulative Update (CU) 14 as soon as possible to mitigate the vulnerability.<\/p><p>For Exchange Server 2016, first install the latest Cumulative Update (CU) 23 and then <a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Security\/ExchangeExtendedProtectionManagement\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">download the Exchange Extended Protection Management PowerShell script<\/a>. This will automatically set up and configure the Extended Protection (EP) option on Exchange Server.<\/p><h3 class=\"wp-block-heading\"><strong>Check the Exchange Server Health<\/strong><\/h3><p>To confirm that the Exchange Server is protected, after <a href=\"https:\/\/www.stellarinfo.com\/article\/install-exchange-cumulative-updates.php\" target=\"_blank\" rel=\"noreferrer noopener\">installing the latest Cumulative Update<\/a> (CU), you must run the Exchange Server Health Checker script. <a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Diagnostics\/HealthChecker\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Downloaded the Health Checker script<\/a> and run the script by using the below cmdlet:<\/p><pre class=\"wp-block-code command_container\"><code><code>HealthChecker.ps1<\/code><\/code><\/pre><p>To run the script against a remote server, use this cmdlet:<\/p><pre class=\"wp-block-code command_container\"><code><code>HealthChecker.ps1 -Server &lt;server name&gt;<\/code><\/code><\/pre><p>To run the script against multiple servers, you can execute the cmdlet as given below:<\/p><pre class=\"wp-block-code command_container\"><code><code>HealthChecker.ps1 -Server &lt;server name, server name, server name&gt;<\/code><\/code><\/pre><blockquote class=\"note_alert\">\n<p><em><strong>Note:<\/strong> In above cmdlet, separate the servers name with commas<\/em>.<\/p>\n<\/blockquote><p>The HealthChecker.ps1 script will give a lot of information about the status and upkeep of the Exchange Server, as well as the status of the Extended Protection (EP) feature.<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"133\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/status-of-the-Extended-Protection-EP-feature.png\" alt=\"status of the Extended Protection EP feature\" class=\"wp-image-162537 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/status-of-the-Extended-Protection-EP-feature.png 589w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/status-of-the-Extended-Protection-EP-feature-300x68.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/status-of-the-Extended-Protection-EP-feature-150x34.png 150w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/figure><p><code>Extended Protection Enabled (Any VDir): False<\/code><\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"912\" height=\"94\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Extended-Protection-Enabled-Any-VDir-False.png\" alt=\"Extended Protection Enabled Any VDir False\" class=\"wp-image-162538 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Extended-Protection-Enabled-Any-VDir-False.png 912w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Extended-Protection-Enabled-Any-VDir-False-300x31.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Extended-Protection-Enabled-Any-VDir-False-768x79.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Extended-Protection-Enabled-Any-VDir-False-150x15.png 150w\" sizes=\"auto, (max-width: 912px) 100vw, 912px\" \/><\/figure><p><code>Security Vulnerability: CVE-2022-24516, CVE-2022-21979, CVE-2022-21980, CVE-2022-24477, CVE-2022-30134<\/code><\/p><p><code>Your Exchange server is at risk. Install the latest SU and enable Extended Protection<\/code><\/p><p>In addition, ensure that antivirus and firewalls are installed, and good backup system and failover system are in place.<\/p><h3 class=\"wp-block-heading\"><strong>How to Recover Data if the Exchange Server gets Compromised?<\/strong><\/h3><p>In case your Exchange Server gets compromised or attacked by ransomware\/malware, you can isolate your server from the network and create a new server. Then, you can restore the databases on the new server. But this involves a lot of time and administrative efforts. However, if the database gets damaged or corrupted, you can rely on backups but this means losing some of the data (from when the backup was taken to when the server was compromised).<\/p><p>Another option to recover the data in the least possible time is by using an <a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Exchange Recovery tool<\/a>, like <strong>Stellar Repair for Exchange<\/strong>. This application helps to extract mailboxes from the compromised\/failed Exchange Server or corrupted databases and export them to a new live Exchange Server.<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/cloud.stellarinfo.com\/StellarRepairforExchange-B.exe\"><img loading=\"lazy\" decoding=\"async\" width=\"226\" height=\"62\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/Free-download-for-windows-1.png\" alt=\"Free Download for Windows\" class=\"wp-image-122415 apply-gradient-on-post-images\"><\/a><\/figure>\n<\/div><h2 class=\"wp-block-heading\" id=\"to-conclude\"><strong>To Conclude<\/strong><\/h2><p>Microsoft has informed us about a new zero-day vulnerability &ndash; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21410\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2024-21410<\/a> in Exchange Servers and also released the Cumulative Update to fix this vulnerability. So, it is important to install the latest update to mitigate the vulnerability and protect against any malicious attacks. When installing the Cumulative Updates, it is suggested to follow the proper process and take into consideration all the required prerequisites. Any error or mistake while installing the updates can stop the installation process and can also impact the server and databases.<\/p><p>If your Exchange Server gets compromised, you can take the help of a tool, like <strong>Stellar Repair for Exchange<\/strong> to recover data from the compromised server.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has identified a zero-day vulnerability in Exchange Server, which attackers are&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\">Continue reading <span class=\"screen-reader-text\">Microsoft New Critical Exchange Bug Exploited as Zero-Day<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":162546,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25],"tags":[5717],"class_list":["post-162533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exchange-server","tag-vulnerability-in-exchange-server","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft New Critical Exchange Bug Exploited as Zero-Day<\/title>\n<meta name=\"description\" content=\"New Exchange zero-day alert! Understand the risks, essential steps to take, and latest security updates to stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft New Critical Exchange Bug Exploited as Zero-Day\" \/>\n<meta property=\"og:description\" content=\"New Exchange zero-day alert! Understand the risks, essential steps to take, and latest security updates to stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-16T11:19:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T08:57:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shelly Bhardwaj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shelly Bhardwaj\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\"},\"author\":{\"name\":\"Shelly Bhardwaj\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/560294d29c29906f1a494397d89ac5b5\"},\"headline\":\"Microsoft New Critical Exchange Bug Exploited as Zero-Day\",\"datePublished\":\"2024-02-16T11:19:49+00:00\",\"dateModified\":\"2025-06-17T08:57:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\"},\"wordCount\":763,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg\",\"keywords\":[\"vulnerability in Exchange Server\"],\"articleSection\":[\"Exchange Server Recovery\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\",\"name\":\"Microsoft New Critical Exchange Bug Exploited as Zero-Day\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg\",\"datePublished\":\"2024-02-16T11:19:49+00:00\",\"dateModified\":\"2025-06-17T08:57:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/560294d29c29906f1a494397d89ac5b5\"},\"description\":\"New Exchange zero-day alert! Understand the risks, essential steps to take, and latest security updates to stay safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Microsoft New Critical Exchange Bug Exploited as Zero Day\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft New Critical Exchange Bug Exploited as Zero-Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/560294d29c29906f1a494397d89ac5b5\",\"name\":\"Shelly Bhardwaj\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/55b79705325614a5202bfcbe257c51b4bfd3229f8c27cd88856c412e9d171b8d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/55b79705325614a5202bfcbe257c51b4bfd3229f8c27cd88856c412e9d171b8d?s=96&d=mm&r=g\",\"caption\":\"Shelly Bhardwaj\"},\"description\":\"I am a Product Consultant and is associated with Stellar Data Recovery from last 8 years. I write about the latest technology tips and provide custom solutions related to Exchange Server, Office 365, MS Outlook, and many other Email Clients &amp; different flavors of OS Servers. Read More\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/shelly-bhardwaj\/\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/shelly\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft New Critical Exchange Bug Exploited as Zero-Day","description":"New Exchange zero-day alert! Understand the risks, essential steps to take, and latest security updates to stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft New Critical Exchange Bug Exploited as Zero-Day","og_description":"New Exchange zero-day alert! Understand the risks, essential steps to take, and latest security updates to stay safe.","og_url":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/","og_site_name":"Stellar Data Recovery Blog","article_published_time":"2024-02-16T11:19:49+00:00","article_modified_time":"2025-06-17T08:57:05+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg","type":"image\/jpeg"}],"author":"Shelly Bhardwaj","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Shelly Bhardwaj","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/"},"author":{"name":"Shelly Bhardwaj","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/560294d29c29906f1a494397d89ac5b5"},"headline":"Microsoft New Critical Exchange Bug Exploited as Zero-Day","datePublished":"2024-02-16T11:19:49+00:00","dateModified":"2025-06-17T08:57:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/"},"wordCount":763,"commentCount":0,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg","keywords":["vulnerability in Exchange Server"],"articleSection":["Exchange Server Recovery"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/","url":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/","name":"Microsoft New Critical Exchange Bug Exploited as Zero-Day","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg","datePublished":"2024-02-16T11:19:49+00:00","dateModified":"2025-06-17T08:57:05+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/560294d29c29906f1a494397d89ac5b5"},"description":"New Exchange zero-day alert! Understand the risks, essential steps to take, and latest security updates to stay safe.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2024\/02\/Microsoft-New-Critical-Exchange-Bug-Exploited-as-Zero-Day.jpg","width":1000,"height":600,"caption":"Microsoft New Critical Exchange Bug Exploited as Zero Day"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/microsoft-new-critical-exchange-bug-exploited-as-zero-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft New Critical Exchange Bug Exploited as Zero-Day"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/560294d29c29906f1a494397d89ac5b5","name":"Shelly Bhardwaj","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/55b79705325614a5202bfcbe257c51b4bfd3229f8c27cd88856c412e9d171b8d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55b79705325614a5202bfcbe257c51b4bfd3229f8c27cd88856c412e9d171b8d?s=96&d=mm&r=g","caption":"Shelly Bhardwaj"},"description":"I am a Product Consultant and is associated with Stellar Data Recovery from last 8 years. I write about the latest technology tips and provide custom solutions related to Exchange Server, Office 365, MS Outlook, and many other Email Clients &amp; different flavors of OS Servers. Read More","sameAs":["https:\/\/www.linkedin.com\/in\/shelly-bhardwaj\/"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/shelly\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/162533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=162533"}],"version-history":[{"count":9,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/162533\/revisions"}],"predecessor-version":[{"id":166627,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/162533\/revisions\/166627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/162546"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=162533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=162533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=162533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}