1 min read

Microsoft Rolls Out Emergency Fix for Exchange Y2K22 Bug that Affects Email Delivery

Vlad CONSTANTINESCU

January 03, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Microsoft Rolls Out Emergency Fix for Exchange Y2K22 Bug that Affects Email Delivery

Over the weekend, Microsoft deployed an emergency patch to fix the Y2K22 bug that crippled the email delivery system by freezing messages on on-premises Microsoft Exchange servers since Jan. 1, 2022.

The Y2K22 bug caused email messages to be stuck on Exchange Server platforms, apparently due to a date validation error that occurred somewhere around the turn of the year.

To circumvent this issue, Microsoft asks its customers to download a PowerShell script called Reset-ScanEngineVersion.ps1 to reset the scan engine and execute it on each Exchange server that downloads antimalware updates.

Before running the script, users are also advised to change the PowerShell scripts execution policy by running the Set-ExecutionPolicy -ExecutionPolicyRemoteSigned command in PowerShell.

Furthermore, users need to use an elevated instance of PowerShell to execute the script. Otherwise, the script may prove ineffective.

Applying the PowerShell script will update the version of the malware engine to 2112330001. Although it seems to reference a date that doesn’t exist, Microsoft says the scanning engine’s new version is fully supported and works as it should:

“The newly updated scanning engine is fully supported by Microsoft. While we need to work on this sequence longer term, the scanning engine version was not rolled back, rather it was rolled forward into this new sequence. The scanning engine will continue to receive updates in this new sequence.”

For tech-savvy customers, Microsoft also outlined a step-by-step manual solution for this issue, which comprises removing existing engine and metadata, updating to the latest engine version, and verifying the engine’s update info.

Reportedly, the Y2K22 situation was caused by a glitch in the FIP-FS antimalware scanning engine, which Microsoft relies on to protect users starting with Exchange Server 2013.

However, Microsoft says that the problem isn’t related to a failure of the antivirus engine itself, but rather to a date check failure, so it’s not a security threat.

Furthermore, the company said the malware engine crashed due to a signature file version check failure, which lead to messages becoming stuck in transport queues.

tags


Author



Right now

Top posts

How to monitor your online privacy during your Thanksgiving trip

How to monitor your online privacy during your Thanksgiving trip

November 22, 2022

3 min read
Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

Just your yearly dose of Black Friday spam: Cybercrooks get ahead of the game to steal shoppers’ info

November 16, 2022

6 min read
Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

Bitdefender VPN in 2022: the new, the improved, and the soon-to-be

November 14, 2022

5 min read
August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Malicious Actors Exploit TikTok ‘Invisible Challenge’ to Steal Users’ Info Malicious Actors Exploit TikTok ‘Invisible Challenge’ to Steal Users’ Info
Alina BÎZGĂ

December 02, 2022

2 min read
Hackers Breach New Zealand Health Insurer Accuro Hackers Breach New Zealand Health Insurer Accuro
Filip TRUȚĂ

December 02, 2022

2 min read
Flaw allowed man to access private information of other Brinks Home Security customers Flaw allowed man to access private information of other Brinks Home Security customers
Graham CLULEY

November 30, 2022

2 min read