Description of the security update for the tampering vulnerability in Microsoft Exchange Server 2016: December 11, 2018

Applies to: Exchange Server 2016


A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data. An attacker who successfully exploits this vulnerability could modify a targeted user's profile data.

To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-8604

Known issues in this security update

  • When you try to manually install this security update by double-clicking the update file (.msp) to run it in "normal mode" (that is, not as an administrator), some files are not correctly updated.

    When this issue occurs, you don’t receive an error message or any indication that the security update was not correctly installed. Also, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) may stop working. This issue occurs on servers that are using user account control (UAC). The issue occurs because the security update doesn’t correctly stop certain Exchange-related services.

    To avoid this issue, follow these steps to manually install this security update:

    1. Select Start, select All Programs, and then select Accessories.
    2. Right-click Command prompt, and then select Run as administrator.
    3. If the User Account Control dialog box appears, verify that the default action is the action that you want, and then select Continue.
    4. Type the full path of the .msp file, and then press Enter.

    This issue does not occur when you install the update from Microsoft Update.

  • Exchange services may remain in a disabled state after you install this security update. This condition does not indicate that the update is not installed correctly. This condition may occur if the service control scripts experience a problem when they try to return Exchange services to its usual state. To fix this issue, use Services Manager to restore the startup type to Automatic, and then start the affected Exchange services manually. To avoid this issue, run the security update from an elevated command prompt. For more information about how to open an elevated command prompt, visit the following Microsoft webpage: Start a Command Prompt as an Administrator

How to get and install the update

Method 1: Microsoft Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the stand-alone update package through the Microsoft Download Center.

More information

Security update deployment information

For deployment information about this update, see security update deployment information: December 11, 2018

Security update replacement information

This security update replaces the previously released update 4459266.

File information

File hash information

File name SHA1 hash SHA256 hash
Exchange2016-KB4468741-x64-en.msp 0E354BD71F04361C2D3B5178ADDA295E97F7BEE4 4497EBBF8C081CAB8B83187FDBDB6736CFB28D9D9E31AAA86034E106D91D1B8F
Exchange2016-KB4468741-x64-en.msp 04F17C69F383521F408A653530F421B95E148B74 688FD43C402658B1BE0C6DF8B4BA787C7A2D5CB370559E2F1A33353014D66E05

Exchange server file information

The English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

How to get help and support for this security update

Protect yourself online and at home: Windows Security support 

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support