Exchange Server 2013/2016/2019 Security Updates May 2022
Hi All,
Yesterday at the Microsoft Patchday, the Exchange Server 2013/2016/2019 Security Updates May 2022 have been released.
Released: May 2022 Exchange Server Security Updates
Security Update For Exchange Server 2016 CU23 (KB5014261)
Microsoft Exchange Server Elevation of Privilege Vulnerability
There is also a new format of the Security Update. The .exe File is a self-extracting, auto-elevating installer (.exe), which works best for manual installations.
New Exchange Server Security Update and Hotfix Packaging
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_01.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_02.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_03.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_04.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_05.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_06.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_07.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_08.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_09.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_10.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_11.jpg)
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_12.jpg)
After the Setup is installed on all Servers you have to run "PrepareAllDomains" as an Enterprise Admin.
cd C:\Program Files\Microsoft\Exchange Server\V15\Bin
Setup.exe /IAcceptExchangeServerLicenseTerms_DiagnosticDataON /PrepareAllDomains
![](https://icewolffile.blob.core.windows.net/$web/202205/Exchange_2016_CU23_KB5014261_13.jpg)
Regards
Andres Bohren
![](https://icewolffile.blob.core.windows.net/$web/logos/Exchange_logo.png)