Microsoft released three new patches for its Exchange Server software on Tuesday after the National Security Agency (NSA) alerted the company to a fresh batch of critical vulnerabilities.
The new fixes are for three versions of Exchange Server - 2013, 2016 and 2019 - and the flaws are said to be different vulnerabilities to the ones disclosed in March. However, US agencies continue to find and remove vulnerabilities in their systems a month after the previous flaws were first discovered.
In response to the release of new fixes, the White House ordered all its agencies to install them, warning that the vulnerabilities "pose an unacceptable risk" to Federal operations.
Microsoft's Exchange Server email and calendar software is mostly used in on-premise data centres. The popularity of the system was highlighted by the number of reported breaches the followed the discovery of the initial flaws.
"Microsoft released a set of Exchange patches today that are critical," a White House statement read. "We urge all owners and operators of Microsoft Exchange Servers to apply these latest patches immediately. The US government will lead by example - we are requiring all agencies to immediately patch their Exchange servers, as well."
The business guide to ransomware
Everything you need to know to keep your company afloat
Exchange Server vulnerabilities have caused issues for a number of organisations around the world, with many servers having already been breached and still vulnerable via embedded back doors. China state-sponsored hacking group Hafnium was spotted by Microsoft using the vulnerability to break into Exchange Servers to view or steal contents.
These vulnerabilities were patched by Microsoft, but backdoors embedded in breached servers were not closed. Within a few days, other hacking groups began hitting compromised servers with the same flaws to deploy ransomware.
As a result, a US court has had to authorise an FBI operation to "copy and remove" backdoors from hundreds of Exchange Servers. The Justice Department said the operation was "successful", but it only removed backdoors and did not patch the vulnerabilities exploited by the hackers or remove any malware that may have been left behind.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2023.
Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.
Bobby mainly covers hardware reviews, but you will also recognise him as the face of many of our video reviews of laptops and smartphones.