KB5074993 is a February 10, 2026 security update for Microsoft Exchange Server 2019 Cumulative Update 15. This update addresses multiple critical security vulnerabilities including remote code execution and privilege escalation flaws that could allow attackers to compromise Exchange servers.

KB5074993 — Security Update for Microsoft Exchange Server 2019 CU15
KB5074993 is a February 2026 security update that addresses critical vulnerabilities in Microsoft Exchange Server 2019 Cumulative Update 15, including remote code execution and privilege escalation flaws.
KB5074993 is a February 2026 security update that addresses critical vulnerabilities in Microsoft Exchange Server 2019 Cumulative Update 15, including remote code execution and privilege escalation flaws.
In This Article
- Issue Description
- Root Cause
- 1Patches remote code execution vulnerability (CVE-2026-0847)
- 2Resolves privilege escalation vulnerability (CVE-2026-0848)
- 3Fixes information disclosure vulnerability (CVE-2026-0849)
- 4Addresses denial of service vulnerability (CVE-2026-0850)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several critical vulnerabilities in Microsoft Exchange Server 2019 CU15 that could be exploited by attackers:
- Remote Code Execution (RCE) vulnerability -
CVE-2026-0847: Allows authenticated attackers to execute arbitrary code on the Exchange server through malformed email processing - Privilege Escalation vulnerability -
CVE-2026-0848: Enables low-privileged users to gain administrative access to Exchange management functions - Information Disclosure vulnerability -
CVE-2026-0849: Permits unauthorized access to sensitive mailbox data through crafted API requests - Denial of Service vulnerability -
CVE-2026-0850: Causes Exchange services to become unresponsive when processing specially crafted messages
These vulnerabilities affect Exchange Server 2019 installations running Cumulative Update 15 without this security patch applied.
Root Cause
Root Cause
The vulnerabilities stem from insufficient input validation in Exchange Server's message processing engine and inadequate access control checks in the Exchange Management Shell. The remote code execution flaw occurs due to improper handling of MIME-encoded email attachments, while the privilege escalation issue results from incomplete permission verification in PowerShell cmdlet execution paths.
Patches remote code execution vulnerability (CVE-2026-0847)
This fix addresses the critical remote code execution vulnerability in Exchange Server's message transport service. The update implements enhanced input validation for MIME-encoded email attachments and strengthens the email parsing engine to prevent malicious code execution. The patch modifies the Microsoft.Exchange.Transport.dll and Microsoft.Exchange.Data.Transport.dll components to properly sanitize email content before processing.
Resolves privilege escalation vulnerability (CVE-2026-0848)
The update strengthens access control mechanisms in Exchange Management Shell by implementing additional permission checks for administrative cmdlets. The fix modifies the Microsoft.Exchange.Management.dll component to ensure proper role-based access control (RBAC) validation before executing privileged operations. This prevents low-privileged users from escalating their permissions through Exchange PowerShell cmdlets.
Key changes include:
- Enhanced RBAC validation in Exchange Management Shell
- Stricter permission checks for mailbox management cmdlets
- Improved audit logging for administrative operations
Fixes information disclosure vulnerability (CVE-2026-0849)
This security fix prevents unauthorized access to sensitive mailbox data through Exchange Web Services (EWS) API. The update implements proper authorization checks in the Microsoft.Exchange.Services.dll component to ensure users can only access mailbox data they have explicit permissions for. The patch also strengthens the EWS authentication mechanism to prevent session hijacking attacks.
Protected data includes:
- Email message content and metadata
- Calendar entries and meeting details
- Contact information and distribution lists
- Mailbox folder structures and permissions
Addresses denial of service vulnerability (CVE-2026-0850)
The update resolves a denial of service vulnerability that could cause Exchange services to become unresponsive when processing malformed messages. The fix implements improved error handling and resource management in the Microsoft.Exchange.Store.dll component to prevent service crashes and memory exhaustion attacks.
Improvements include:
- Enhanced message validation before processing
- Better memory management for large message handling
- Improved error recovery mechanisms
- Resource throttling to prevent service overload
Installation
Installation
KB5074993 is available through multiple deployment methods for Microsoft Exchange Server 2019 environments:
Microsoft Update Catalog
Download the security update directly from Microsoft Update Catalog. The update package is approximately 485 MB and requires local administrator privileges for installation.
Windows Server Update Services (WSUS)
Enterprise environments can deploy this update through WSUS. The update will appear in the "Critical Updates" classification and can be approved for automatic deployment to Exchange servers.
System Center Configuration Manager (SCCM)
Deploy through SCCM software update management. Create a deployment package targeting Exchange Server 2019 CU15 systems.
Prerequisites
- Microsoft Exchange Server 2019 Cumulative Update 15 must be installed
- Local administrator privileges required for installation
- Minimum 1 GB free disk space on system drive
- All Exchange services must be running before installation
Installation Process
The update installation requires a planned maintenance window as Exchange services will restart during the process. Installation typically takes 15-30 minutes depending on server configuration.
Restart Required: Yes - Exchange services restart automatically during installation. Server reboot is not required.
Known Issues
Known Issues
The following known issues have been identified with KB5074993 installation:
Installation Failures
- Error 0x80070643: Installation may fail if Exchange services are not running. Ensure all Exchange services are started before attempting installation.
- Error 0x80070020: Occurs when Exchange databases are being backed up during installation. Stop backup operations before installing the update.
Post-Installation Issues
- Exchange Management Shell connectivity: Some users may experience temporary connectivity issues with Exchange Management Shell immediately after installation. Restart the PowerShell session to resolve.
- Outlook Web App performance: Minor performance degradation may occur for 10-15 minutes after installation while Exchange services fully initialize.
Workarounds
For installation error 0x80070643:
Get-Service MSExchange* | Start-Service
Restart-Service MSExchangeServiceHostFor Exchange Management Shell issues:
Remove-PSSession -Session (Get-PSSession)
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapInOverview
KB5074993 is a critical security update released on February 10, 2026, for Microsoft Exchange Server 2019 Cumulative Update 15. This update addresses four significant security vulnerabilities that could allow attackers to execute arbitrary code, escalate privileges, access sensitive information, or cause denial of service conditions on affected Exchange servers.
Security Vulnerabilities Addressed
This security update resolves the following critical vulnerabilities:
CVE-2026-0847 - Remote Code Execution
A critical remote code execution vulnerability exists in Exchange Server's message transport service. Authenticated attackers can exploit this vulnerability by sending specially crafted email messages with malformed MIME attachments. Successful exploitation allows attackers to execute arbitrary code with the privileges of the Exchange service account, potentially leading to complete server compromise.
CVE-2026-0848 - Privilege Escalation
This vulnerability allows low-privileged Exchange users to escalate their permissions to administrative level through Exchange Management Shell. Attackers can exploit insufficient access control checks in PowerShell cmdlet execution to gain unauthorized administrative access to Exchange management functions.
CVE-2026-0849 - Information Disclosure
An information disclosure vulnerability in Exchange Web Services (EWS) API allows unauthorized access to sensitive mailbox data. Attackers can craft malicious API requests to bypass authentication mechanisms and access email content, calendar entries, and contact information from other users' mailboxes.
CVE-2026-0850 - Denial of Service
A denial of service vulnerability can cause Exchange services to become unresponsive when processing specially crafted messages. This vulnerability can be exploited to disrupt email services and impact business operations.
Affected Systems
This security update applies specifically to:
| Product | Version | Build Number | Status |
|---|---|---|---|
| Microsoft Exchange Server 2019 | Cumulative Update 15 | Build 15.2.1544.4 | Affected |
Organizations running earlier versions of Exchange Server 2019 should first upgrade to CU15 before applying this security update.
Technical Implementation Details
The security update modifies several core Exchange Server components to address the identified vulnerabilities:
Transport Service Enhancements
The update strengthens the message transport pipeline by implementing enhanced input validation for email attachments and improving the MIME parsing engine. These changes prevent malicious code execution while maintaining compatibility with legitimate email processing.
Management Shell Security
Role-based access control (RBAC) mechanisms are enhanced to prevent privilege escalation attacks. The update implements additional permission verification steps for administrative cmdlets and improves audit logging for security monitoring.
Web Services Protection
Exchange Web Services API receives improved authentication and authorization controls to prevent unauthorized data access. The update implements stricter session management and enhances data access validation.
Service Reliability
Denial of service protection is improved through better resource management and error handling mechanisms. The update implements message validation improvements and resource throttling to maintain service availability.
Deployment Considerations
Organizations should plan the deployment of KB5074993 carefully to minimize service disruption:
Maintenance Window Planning
Schedule installation during planned maintenance windows as Exchange services will restart during the update process. Typical installation time ranges from 15-30 minutes depending on server configuration and workload.
High Availability Environments
For Exchange environments with Database Availability Groups (DAG), install the update on one server at a time to maintain service availability. Allow sufficient time between installations for database replication to complete.
Backup Considerations
Ensure all Exchange databases are backed up before installing the security update. Stop any running backup operations during the installation process to prevent conflicts.
Verification and Monitoring
After installing KB5074993, verify successful installation using the following methods:
PowerShell Verification
Get-ExchangeServer | Get-ExchangeServer | FL Name,AdminDisplayVersionEvent Log Monitoring
Monitor the Application and System event logs for any post-installation issues. Look for Exchange-related error events that may indicate configuration problems.
Service Status Check
Get-Service MSExchange* | Where-Object {$_.Status -ne "Running"}This command should return no results if all Exchange services are running properly.
Security Impact Assessment
The vulnerabilities addressed by KB5074993 pose significant risks to Exchange Server environments:
- High Impact: Remote code execution vulnerability could lead to complete server compromise
- Medium Impact: Privilege escalation and information disclosure vulnerabilities could result in unauthorized data access
- Medium Impact: Denial of service vulnerability could disrupt business-critical email services
Organizations should prioritize the installation of this security update to protect against these threats.
Frequently Asked Questions
What does KB5074993 resolve?
Which systems require KB5074993?
Is KB5074993 a security update?
What are the prerequisites for KB5074993?
Are there known issues with KB5074993?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5074994 — Security Update for Microsoft Exchange Server 2019 CU14
KB5074994 is a February 2026 security update that addresses multiple vulnerabilities in Microsoft Exchange Server 2019 Cumulative Update 14, including remote code execution and elevation of privilege flaws.

KB5074992 — Security Update for Microsoft Exchange Server Subscription Edition RTM
KB5074992 is a February 2026 security update that addresses multiple vulnerabilities in Microsoft Exchange Server Subscription Edition RTM, including remote code execution and elevation of privilege flaws affecting Exchange Server environments.

KB5074995 — Security Update for Microsoft Exchange Server 2016 CU23
KB5074995 is a February 2026 security update that addresses multiple vulnerabilities in Microsoft Exchange Server 2016 Cumulative Update 23, including remote code execution and elevation of privilege flaws.