Microsoft warns of Exchange zero-day flaw exploited in attacks
microsoftexchangecve-2026-42897zero-dayvulnerabilitycybersecurityowaxsseemseomtexchange serveron-premises

Microsoft warns of Exchange zero-day flaw exploited in attacks

CVE-2026-42897: Why Your Exchange Zero-Day Mitigation Might Look Broken (But Isn't)

Another Exchange zero-day. If you're running on-premises Exchange, you probably felt that familiar dread when Microsoft dropped the advisory for CVE-2026-42897. It's a high-severity spoofing vulnerability, actively exploited, and it lets attackers run arbitrary code in Outlook on the web (OWA). The immediate problem isn't just the vulnerability itself, but the confusion around the mitigation: administrators are seeing messages that make them think the fix isn't working, even when it is.

I've seen the discussions on Reddit, especially on r/exchangeserver, where people are trying to figure out if EEMS actually applied the mitigation. That "invalid for this Exchange version" message is a real head-scratcher when you're trying to secure your environment at speed. Here's what's actually happening and how to be sure you're protected.

The Incident: Another OWA XSS in the Wild

Microsoft confirmed that CVE-2026-42897 is a high-severity spoofing vulnerability that allows cross-site scripting (XSS). This isn't theoretical; it's actively being exploited. The target is OWA users on up-to-date versions of Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE). Exchange Online isn't affected, which is a small relief for those who've made the jump.

The Mechanism: How a Malicious Email Gets Code Running

The attack chain for CVE-2026-42897 is straightforward, which often makes it more dangerous. An attacker sends a specially crafted email. If a user opens that email in Outlook Web Access, and certain interaction conditions are met, arbitrary JavaScript can execute within the user's browser context.

Think about the implications of that: session hijacking, credential theft, or further client-side exploitation. It's a classic XSS scenario, but the fact that it's hitting Exchange OWA and is actively exploited makes it a priority.

A close-up of a computer screen displaying an Outlook Web Access interface with a suspicious email open, code snippets visible in the background, dark and urgent lighting
Close-up of a computer screen displaying an Outlook

The Impact: On-Premises Exposure and Patching Hurdles

If you're running Exchange Server 2016, 2019, or SE on-premises, your OWA users are exposed. The immediate risk is to confidentiality and integrity, as an attacker could manipulate data or steal information through the executed JavaScript.

The long-term fix, a permanent patch, isn't available yet. Microsoft plans to release updates for Exchange SE RTM, Exchange 2016 CU23, and Exchange Server 2019 CU14 and CU15. Here's the catch, and it's a big one: updates for Exchange 2016 and 2019 will only be available to customers enrolled in the Period 2 Exchange Server ESU (Extended Security Update) program. If you're not on ESU, you're going to be stuck without a patch for this.

The Response: Mitigations, Verification, and the ESU Wall

Microsoft has pushed out immediate mitigations, which is good. They're coming through two channels: the Exchange Emergency Mitigation Service (EEMS) for automatic application, and the Exchange on-premises Mitigation Tool (EOMT) for manual application, especially in air-gapped environments.

Automatic Mitigation with EEMS

EEMS was introduced back in September 2021, after the ProxyLogon and ProxyShell zero-days. It runs as a Windows service on Exchange Mailbox servers and is automatically enabled on servers with that role. For EEMS to check for new mitigations, your server needs to be running an Exchange Server version newer than March 2023.

Here's the thing about EEMS and CVE-2026-42897: many admins are seeing a "cosmetic" issue where the mitigation might display as "invalid for this exchange version" even if it's successfully applied. This is where the Reddit discussions come in. You need to verify it yourself.

To check the status, you can use these PowerShell commands in an elevated Exchange Management Shell:

  • get-organizationconfig | ft mitigationsenabled
  • get-exchangeserver | ft name, mitigationsenabled, mitigationsapplied

If mitigationsenabled is True and mitigationsapplied shows CVE-2026-42897, you're likely good, even with the "invalid" message. Trust the PowerShell output over the potentially misleading UI.

Manual Mitigation with EOMT

For air-gapped environments, or if you just prefer manual control, the Exchange on-premises Mitigation Tool (EOMT) is your friend. Download the latest EOMT version and apply the mitigation via an elevated Exchange Management Shell (EMS).

  • For a single server: .\EOMT.ps1 -CVE "CVE-2026-42897"
  • For all servers (excluding Edge): Get-ExchangeServer | Where-Object { $_.ServerRole -ne "Edge" } | .\EOMT.ps1 -CVE "CVE-2026-42897"

Known Issues with the Mitigation

Applying the mitigation isn't without its quirks. Microsoft notes a few known issues:

  • OWA Print Calendar functionality might not work. You can copy data, take a screenshot, or use the Outlook Desktop client instead.
  • Inline images might not display correctly in recipients' OWA reading pane. Send images as attachments or use the Outlook Desktop client.
  • OWA light (the URL ending in /?layout=light) doesn't work properly. This feature was deprecated years ago, so it's less of a concern.

These are mostly cosmetic or minor functional impacts. They're a small price to pay for blocking an active zero-day.

A person's hands typing commands into a glowing PowerShell terminal, code scrolling rapidly, in a dimly lit server room, focus on the screen
Person's hands typing commands into a glowing PowerShell

My Take: Verify Everything, and Get on ESU

The immediate priority is to apply the mitigations and, critically, verify their successful application using the PowerShell commands. Don't let a "cosmetic" error message give you a false sense of insecurity. Trust your command line.

Beyond that, if you're still running Exchange 2016 or 2019 and not on the ESU program, this zero-day should be a wake-up call. The fact that permanent patches for these versions will be ESU-gated means you're going to be increasingly vulnerable to future exploits. CISA and the NSA have been pushing guidance to harden Exchange servers for a reason; 19 Exchange vulnerabilities have been added to CISA's actively exploited list in the last five years, with 14 also abused in ransomware. That's a trend you don't want to be on the wrong side of.

Get on ESU, or accelerate your migration plans. The cost of not doing so is only going to climb.

Daniel Marsh
Daniel Marsh
Former SOC analyst turned security writer. Methodical and evidence-driven, breaks down breaches and vulnerabilities with clarity, not drama.