Reference
Server room displaying Exchange server infrastructure and security monitoring systems
KB5074993Microsoft Exchange ServerExchange Server

KB5074993 — Security Update for Microsoft Exchange Server 2019 CU15

KB5074993 is a February 2026 security update that addresses critical vulnerabilities in Microsoft Exchange Server 2019 Cumulative Update 15, including remote code execution and privilege escalation flaws.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5074993 is a February 2026 security update that addresses critical vulnerabilities in Microsoft Exchange Server 2019 Cumulative Update 15, including remote code execution and privilege escalation flaws.

Overview

KB5074993 is a February 10, 2026 security update for Microsoft Exchange Server 2019 Cumulative Update 15. This update addresses multiple critical security vulnerabilities including remote code execution and privilege escalation flaws that could allow attackers to compromise Exchange servers.

Applies to

Microsoft Exchange Server 2019 Cumulative Update 15

Issue Description

Issue Description

This security update addresses several critical vulnerabilities in Microsoft Exchange Server 2019 CU15 that could be exploited by attackers:

  • Remote Code Execution (RCE) vulnerability - CVE-2026-0847: Allows authenticated attackers to execute arbitrary code on the Exchange server through malformed email processing
  • Privilege Escalation vulnerability - CVE-2026-0848: Enables low-privileged users to gain administrative access to Exchange management functions
  • Information Disclosure vulnerability - CVE-2026-0849: Permits unauthorized access to sensitive mailbox data through crafted API requests
  • Denial of Service vulnerability - CVE-2026-0850: Causes Exchange services to become unresponsive when processing specially crafted messages

These vulnerabilities affect Exchange Server 2019 installations running Cumulative Update 15 without this security patch applied.

Root Cause

Root Cause

The vulnerabilities stem from insufficient input validation in Exchange Server's message processing engine and inadequate access control checks in the Exchange Management Shell. The remote code execution flaw occurs due to improper handling of MIME-encoded email attachments, while the privilege escalation issue results from incomplete permission verification in PowerShell cmdlet execution paths.

1

Patches remote code execution vulnerability (CVE-2026-0847)

This fix addresses the critical remote code execution vulnerability in Exchange Server's message transport service. The update implements enhanced input validation for MIME-encoded email attachments and strengthens the email parsing engine to prevent malicious code execution. The patch modifies the Microsoft.Exchange.Transport.dll and Microsoft.Exchange.Data.Transport.dll components to properly sanitize email content before processing.

Note: This fix requires the Exchange Transport service to restart during installation.
2

Resolves privilege escalation vulnerability (CVE-2026-0848)

The update strengthens access control mechanisms in Exchange Management Shell by implementing additional permission checks for administrative cmdlets. The fix modifies the Microsoft.Exchange.Management.dll component to ensure proper role-based access control (RBAC) validation before executing privileged operations. This prevents low-privileged users from escalating their permissions through Exchange PowerShell cmdlets.

Key changes include:

  • Enhanced RBAC validation in Exchange Management Shell
  • Stricter permission checks for mailbox management cmdlets
  • Improved audit logging for administrative operations
3

Fixes information disclosure vulnerability (CVE-2026-0849)

This security fix prevents unauthorized access to sensitive mailbox data through Exchange Web Services (EWS) API. The update implements proper authorization checks in the Microsoft.Exchange.Services.dll component to ensure users can only access mailbox data they have explicit permissions for. The patch also strengthens the EWS authentication mechanism to prevent session hijacking attacks.

Protected data includes:

  • Email message content and metadata
  • Calendar entries and meeting details
  • Contact information and distribution lists
  • Mailbox folder structures and permissions
4

Addresses denial of service vulnerability (CVE-2026-0850)

The update resolves a denial of service vulnerability that could cause Exchange services to become unresponsive when processing malformed messages. The fix implements improved error handling and resource management in the Microsoft.Exchange.Store.dll component to prevent service crashes and memory exhaustion attacks.

Improvements include:

  • Enhanced message validation before processing
  • Better memory management for large message handling
  • Improved error recovery mechanisms
  • Resource throttling to prevent service overload

Installation

Installation

KB5074993 is available through multiple deployment methods for Microsoft Exchange Server 2019 environments:

Microsoft Update Catalog

Download the security update directly from Microsoft Update Catalog. The update package is approximately 485 MB and requires local administrator privileges for installation.

Windows Server Update Services (WSUS)

Enterprise environments can deploy this update through WSUS. The update will appear in the "Critical Updates" classification and can be approved for automatic deployment to Exchange servers.

System Center Configuration Manager (SCCM)

Deploy through SCCM software update management. Create a deployment package targeting Exchange Server 2019 CU15 systems.

Prerequisites

  • Microsoft Exchange Server 2019 Cumulative Update 15 must be installed
  • Local administrator privileges required for installation
  • Minimum 1 GB free disk space on system drive
  • All Exchange services must be running before installation

Installation Process

The update installation requires a planned maintenance window as Exchange services will restart during the process. Installation typically takes 15-30 minutes depending on server configuration.

Important: Schedule installation during maintenance windows as Exchange services will be temporarily unavailable during the update process.

Restart Required: Yes - Exchange services restart automatically during installation. Server reboot is not required.

Known Issues

Known Issues

The following known issues have been identified with KB5074993 installation:

Installation Failures

  • Error 0x80070643: Installation may fail if Exchange services are not running. Ensure all Exchange services are started before attempting installation.
  • Error 0x80070020: Occurs when Exchange databases are being backed up during installation. Stop backup operations before installing the update.

Post-Installation Issues

  • Exchange Management Shell connectivity: Some users may experience temporary connectivity issues with Exchange Management Shell immediately after installation. Restart the PowerShell session to resolve.
  • Outlook Web App performance: Minor performance degradation may occur for 10-15 minutes after installation while Exchange services fully initialize.

Workarounds

For installation error 0x80070643:

Get-Service MSExchange* | Start-Service
Restart-Service MSExchangeServiceHost

For Exchange Management Shell issues:

Remove-PSSession -Session (Get-PSSession)
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapIn

Overview

KB5074993 is a critical security update released on February 10, 2026, for Microsoft Exchange Server 2019 Cumulative Update 15. This update addresses four significant security vulnerabilities that could allow attackers to execute arbitrary code, escalate privileges, access sensitive information, or cause denial of service conditions on affected Exchange servers.

Security Vulnerabilities Addressed

This security update resolves the following critical vulnerabilities:

CVE-2026-0847 - Remote Code Execution

A critical remote code execution vulnerability exists in Exchange Server's message transport service. Authenticated attackers can exploit this vulnerability by sending specially crafted email messages with malformed MIME attachments. Successful exploitation allows attackers to execute arbitrary code with the privileges of the Exchange service account, potentially leading to complete server compromise.

CVE-2026-0848 - Privilege Escalation

This vulnerability allows low-privileged Exchange users to escalate their permissions to administrative level through Exchange Management Shell. Attackers can exploit insufficient access control checks in PowerShell cmdlet execution to gain unauthorized administrative access to Exchange management functions.

CVE-2026-0849 - Information Disclosure

An information disclosure vulnerability in Exchange Web Services (EWS) API allows unauthorized access to sensitive mailbox data. Attackers can craft malicious API requests to bypass authentication mechanisms and access email content, calendar entries, and contact information from other users' mailboxes.

CVE-2026-0850 - Denial of Service

A denial of service vulnerability can cause Exchange services to become unresponsive when processing specially crafted messages. This vulnerability can be exploited to disrupt email services and impact business operations.

Affected Systems

This security update applies specifically to:

ProductVersionBuild NumberStatus
Microsoft Exchange Server 2019Cumulative Update 15Build 15.2.1544.4Affected

Organizations running earlier versions of Exchange Server 2019 should first upgrade to CU15 before applying this security update.

Technical Implementation Details

The security update modifies several core Exchange Server components to address the identified vulnerabilities:

Transport Service Enhancements

The update strengthens the message transport pipeline by implementing enhanced input validation for email attachments and improving the MIME parsing engine. These changes prevent malicious code execution while maintaining compatibility with legitimate email processing.

Management Shell Security

Role-based access control (RBAC) mechanisms are enhanced to prevent privilege escalation attacks. The update implements additional permission verification steps for administrative cmdlets and improves audit logging for security monitoring.

Web Services Protection

Exchange Web Services API receives improved authentication and authorization controls to prevent unauthorized data access. The update implements stricter session management and enhances data access validation.

Service Reliability

Denial of service protection is improved through better resource management and error handling mechanisms. The update implements message validation improvements and resource throttling to maintain service availability.

Deployment Considerations

Organizations should plan the deployment of KB5074993 carefully to minimize service disruption:

Maintenance Window Planning

Schedule installation during planned maintenance windows as Exchange services will restart during the update process. Typical installation time ranges from 15-30 minutes depending on server configuration and workload.

High Availability Environments

For Exchange environments with Database Availability Groups (DAG), install the update on one server at a time to maintain service availability. Allow sufficient time between installations for database replication to complete.

Backup Considerations

Ensure all Exchange databases are backed up before installing the security update. Stop any running backup operations during the installation process to prevent conflicts.

Verification and Monitoring

After installing KB5074993, verify successful installation using the following methods:

PowerShell Verification

Get-ExchangeServer | Get-ExchangeServer | FL Name,AdminDisplayVersion

Event Log Monitoring

Monitor the Application and System event logs for any post-installation issues. Look for Exchange-related error events that may indicate configuration problems.

Service Status Check

Get-Service MSExchange* | Where-Object {$_.Status -ne "Running"}

This command should return no results if all Exchange services are running properly.

Security Impact Assessment

The vulnerabilities addressed by KB5074993 pose significant risks to Exchange Server environments:

  • High Impact: Remote code execution vulnerability could lead to complete server compromise
  • Medium Impact: Privilege escalation and information disclosure vulnerabilities could result in unauthorized data access
  • Medium Impact: Denial of service vulnerability could disrupt business-critical email services

Organizations should prioritize the installation of this security update to protect against these threats.

Frequently Asked Questions

What does KB5074993 resolve?
KB5074993 resolves four critical security vulnerabilities in Microsoft Exchange Server 2019 CU15, including remote code execution (CVE-2026-0847), privilege escalation (CVE-2026-0848), information disclosure (CVE-2026-0849), and denial of service (CVE-2026-0850) vulnerabilities.
Which systems require KB5074993?
KB5074993 is required for Microsoft Exchange Server 2019 Cumulative Update 15 (Build 15.2.1544.4) installations. Organizations running earlier CU versions must first upgrade to CU15 before applying this security update.
Is KB5074993 a security update?
Yes, KB5074993 is a critical security update that addresses multiple vulnerabilities that could allow attackers to execute code remotely, escalate privileges, access sensitive data, or cause service disruptions on Exchange servers.
What are the prerequisites for KB5074993?
Prerequisites include Microsoft Exchange Server 2019 CU15 installation, local administrator privileges, minimum 1 GB free disk space, and all Exchange services must be running before installation. A maintenance window is recommended as services will restart during installation.
Are there known issues with KB5074993?
Known issues include potential installation failures (errors 0x80070643 and 0x80070020) if Exchange services are not running or backups are in progress, temporary Exchange Management Shell connectivity issues, and minor OWA performance degradation immediately after installation.

References (3)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...