8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.076 Low
EPSS
Percentile
94.1%
Cumulative Update 12 for Microsoft Exchange Server 2016 was released on February 12, 2019. This cumulative update is a security update. It includes fixes for nonsecurity issues and all previously released fixes for security and nonsecurity issues. These fixes will also be included in later cumulative updates for Exchange Server 2016. This update provides a security advisory in Microsoft Exchange. For more information, see Security Advisory ADV190004. It also resolves some vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2019-0686 and Microsoft Common Vulnerabilities and Exposures CVE-2019-0724.This update also includes new daylight saving time (DST) updates for Exchange Server 2016. For more information about DST, see Daylight Saving Time Help and Support Center.
In multidomain Active Directory forests in which Exchange is installed or has been prepared previously by using the /PrepareDomain option in SETUP, this action must be completed after the**/PrepareADcommand for this cumulative update has been completed and the changes are replicated to all domains. Setup will try to execute the/PrepareAD** command during the first server installation. Installation will finish only if the user who initiated SETUP has the appropriate permissions.
This cumulative update fixes the issues that are described in the following Microsoft Knowledge Base articles:
Download Cumulative Update 12 for Exchange Server 2016 (KB4471392) now.Download Exchange Server 2016 CU12 UM Language Packs now.Notes
This cumulative update requires Microsoft .NET Framework 4.7.1. A component that’s used within Exchange Server requires a new Visual C++ component to be installed together with Exchange Server. This prerequisite can be downloaded at Visual C++ Redistributable Packages for Visual Studio 2013. For more information, see KB 4295081.For more information about the prerequisites for the setup of Exchange Server 2016, see Exchange 2016 prerequisites.
For deployment information about this update, see security update deployment information: February 12, 2019.
You may have to restart the computer after you apply this cumulative update package.
You don’t have to make any changes to the registry after you apply this cumulative update package.
After you install this cumulative update package, you can’t uninstall the package to revert to an earlier version of Exchange Server 2016. If you uninstall this cumulative update package, Exchange Server 2016 is removed from the server.
For more information about the deployment of Exchange Server 2016, see Release notes for Exchange 2016.
For more information about the coexistence of Exchange Server 2016 and earlier versions of Exchange Server in the same environment, see Exchange 2016 system requirements.
For more information about other Exchange updates, see Exchange Server Updates: Build numbers and release dates.
File name | SHA1 hash | SHA256 hash |
---|---|---|
ExchangeServer2016-x64-cu12.iso | 0E2F7CEB3C21BAB433EFAB50255703044DC2CC71 | 9F295F77C4CDD738C0F8DE8CCBF2D32FE49CDA7502692C9B87F1609E19E41AD3 |
Download the list of files that are included in this security update 4471392.
Learn about the terminology that Microsoft uses to describe software updates.
Help for installing updates: Protect yourself onlineHelp for protecting your Windows-based computer from viruses and malware: Microsoft SecurityLocal support according to your country: International Support
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.076 Low
EPSS
Percentile
94.1%