Microsoft: 92% of Microsoft Exchange Server has mitigated high-risk security vulnerabilities

Microsoft has released a new report on vulnerabilities in Microsoft Exchange Server servers. The report shows that 92% of servers have fixed vulnerabilities.

Microsoft Exchange Server is widely used by government and enterprise organizations all over the world, which can be used to build a local mail server to provide reliable e-mail transmission services, etc.

Especially now that e-mail is widely used is very important for enterprises, because the mail with the enterprise and with customers usually contains confidential information.

If the mail server is hacked, it may lead to very serious consequences. Unfortunately, the Exchange Server system still has high-risk security vulnerabilities.

Attackers can easily invade corporate mail servers and steal all data by exploiting vulnerabilities. However, there are already countless mail servers that have been hacked.

This is also the reason why Microsoft has continuously launched a variety of solutions to solve the vulnerability, but many companies have not repaired the vulnerability so far, so there are security threats.

Statistics show that 92% of Exchange Servers have been repaired or deployed mitigation plans, but there are still 8% of Exchange Servers that are at great risk.

Based on serious security threats, Microsoft continues to strongly remind companies to quickly fix this vulnerability. Telemetry data shows that installing the patch will not affect all current normal functions.

Microsoft said that companies should immediately fix the vulnerability by installing patches, and if they cannot install patches immediately, they should also deploy mitigation plans in a timely manner.

Most of the mitigation solutions provided by Microsoft are automated, so enterprise administrators only need to download the corresponding script and run it with administrator privileges.

In addition, we need to be reminded that some mail servers have been hacked, so administrators need to check whether there are problems such as viruses on the servers when deploying mitigation solutions.

Otherwise, even if the vulnerability is fixed, the attacker can continue to carry out subsequent attacks through malicious software, including but not limited to stealing corporate data and installing ransomware.