During New MAM Enrollment End User Receives – “An error occurred. The enrollment will stop”

During enrollment MDM proceeds successfully, but the MAM enrollment fails with “An error occurred. The enrollment will stop”.

On Android you may experience the following:

Enrollment will successfully complete, however Secure Hub is enrolled only in MDM mode not MAM.

Scenarios that Identify failed enrollments:

  • If PIN authentication is enabled, the user is not prompted to enter the PIN and Secure Hub prompts the following error: “Secure Hub has stopped”
  • The only option displayed is “Home” within Secure Hub. The options such My Apps and Store are not displayed.

Related:

WEM Agent hung sporadically by logon on “application processing”

WEM Agent 1906 sporadically hung after few logins at “application processing”. just logoff and logon helps. Client OS: Citrix Virtual Apps Server with Windows Server 2016 (latest Updates)

Error Message in the Event Log:

Error while Configuring Registry Security for DOMAINtest1

Source: Norskale Agent Service Event ID: 0 2. Event Log one or all of the identity references could not be translated. Source: Norskale Agent Service Event ID: 0 Latest Citrix WEM Agent Log 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Registry Entry -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Xml Value -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Ini Value -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Simple String Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Split Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing String Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing SubString Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15EXCEL.EXE 17:56:55 Event -> VuemApplicationExecutor.ProcessVuemAppAutoLaunch() : Application -> MS Onenote (Id:17) -> AutoLaunch Disabled : Exiting 17:56:55 Event -> VuemApplicationExecutor.CreateDesktopShortcut() : Application -> MS Outlook (Id:13) -> Processing Desktop Shortcut… 17:56:55 Event -> VuemApplicationExecutor.CreateDesktopShortcut() : Application -> MS Word (Id:14) -> Processing Desktop Shortcut… 17:56:55 Event -> VuemApplicationExecutor.ProcessVuemAppAutoLaunch() : Application -> MS PowerPoint (Id:20056) -> AutoLaunch Disabled : Exiting 17:56:55 Event -> VuemApplicationExecutor.CreateDesktopShortcut() : Application -> MS Outlook (Id:13) -> Saving Desktop Shortcut… 17:56:55 Event -> VuemApplicationExecutor.DoPinToTaskBar() : Application -> MS Excel (Id:15) -> Processing TaskBar Pinned Shortcut… 17:56:55 Event -> VuemApplicationExecutor.SaveShortcut() : Working Directory: C:Program Files (x86)Microsoft OfficeOffice15 Target: C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE Arguments: 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing HashTags -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing User Attributes -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Printer Attributes -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> VuemApplicationExecutor.CreateDesktopShortcut() : Application -> MS Word (Id:14) -> Saving Desktop Shortcut… 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing User Parent OU -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Registry Entry -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Xml Value -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Ini Value -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Simple String Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Split Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing String Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing SubString Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15OUTLOOK.EXE 17:56:55 Event -> VuemApplicationExecutor.SaveShortcut() : Working Directory: C:Program Files (x86)Microsoft OfficeOffice15 Target: C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE Arguments: 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing HashTags -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing User Attributes -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Printer Attributes -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> VuemApplicationExecutor.DoPinToTaskBar() : Application -> MS Outlook (Id:13) -> Processing TaskBar Pinned Shortcut… 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing User Parent OU -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Registry Entry -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Xml Value -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing with Ini Value -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Simple String Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing Split Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing String Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> DynamicTokensController.ReplaceDynamicTokens() : Replacing SubString Operations -> no match found for : C:Program Files (x86)Microsoft OfficeOffice15WINWORD.EXE 17:56:55 Event -> VuemApplicationExecutor.DoPinToTaskBar() : Application -> MS Word (Id:14) -> Processing TaskBar

Related:

Microsoft releases Windows 10 builds 18363.815, 18362.815 with a ton of fixes

Patch Tuesday was only a week ago, but it’s now time for this month’s round of optional updates. Typically, Microsoft does this in several installments, offering updates to different versions at different times. But today, Windows 10 version 1909, 1903, 1809, 1803, and 1607 are all getting updates.

The reason that they’re all getting patched today is likely because this is going to be one of the last times to do it. Starting in May, Microsoft won’t be releasing optional cumulative updates anymore, only Patch Tuesday updates. This is to focus on stability for those working from home during the COVID-19 pandemic.

For those on Windows 10 versions 1909 and 1903, you’ll get KB4550945, bringing the build number to 18363.815 and 18362.815, respectively. You can manually download it here, and these are the highlights:

  • Updates an issue that prevents certain apps from opening after you upgrade from a previous version of Windows, and a Bad Image error message appears.
  • Updates in an issue that turns off notifications for devices that use a virtual private network (VPN) on a cellular network.
  • Updates an issue that prevents you from resuming a Microsoft Xbox game on a Windows device after upgrading from a previous version of Windows.
  • Updates an issue that causes a text box that contains multiple lines of text to stop responding in certain scenarios.
  • Updates an issue that generates unexpected notifications when you change the default application settings.
  • Updates an issue that causes Windows Update to stop responding when you check for updates.
  • Updates an issue that fails to print content that is outside of the margins of a document.

Here’s the full list of fixes:

  • Addresses an issue that prevents certain apps from opening after you upgrade from a previous version of Windows, and a Bad Image exception dialog box appears.
  • Addresses in an issue that turns off notifications for devices that use a virtual private network (VPN) on a cellular network.
  • Addresses an issue that prevents you from resuming a Microsoft Xbox game on a Windows device after upgrading from a previous version of Windows.
  • Addresses an issue that causes a box that contains multiple lines of text to stop responding in certain scenarios.
  • Addresses an issue that prevents the touch keyboard from appearing during sign in when the user is prompted for the password.
  • Addresses an issue that prevents the touch keyboard from opening in Universal Windows Platform (UWP) apps when USB devices are connected.
  • Addresses an issue that displays incorrect folder properties in File Explorer when the path is longer than MAX_PATH.
  • Addresses an issue that prevents the correct lock screen from appearing when all of the following are true:
    • The Group Policy Object (GPO) policy “Computer ConfigurationWindows SettingsSecurity SettingsLocal PoliciesSecurity OptionsInteractive Logon: Do not require Ctrl+Alt+Del Computer” is disabled.
    • The GPO policy “Computer ConfigurationAdministrative TemplatesSystemLogonTurn off app notifications on the lock screen” is enabled.
    • The registry key HKLMSOFTWAREPoliciesMicrosoftWindowsSystemDisableLogonBackgroundImage is set to 1.
  • Addresses an issue that generates unexpected notifications related to changing the default application settings.
  • Addresses an issue that causes the sign in screen to be blurry.
  • Addresses an issue that causes Windows Update to stop responding when you check for updates.
  • Addresses an issue that prevents the Sign in options page from opening using the ms-settings:signinoptions-launchfingerprintenrollment Uniform Resource Identifier (URI).
  • Addresses an issue with Bluetooth group policy settings on Microsoft Surface Pro X devices.
  • Addresses an issue that causes a KERNEL_SECURITY_CHECK_FAILURE (139) stop error when Windows resumes from Sleep and turns on certain Bluetooth headsets.
  • Addresses a reliability issue in WDF01000.sys.
  • Addresses an issue that causes an error in logman.exe. The error is, “A user account is required in order to commit the current Data collector Set properties.”
  • Addresses an issue that prevents users from setting the REG_EXPAND_SZ keys in some automated scenarios.
  • Addresses an issue that causes a memory leak in the LsaIso.exe process when the server is under a heavy authentication load and Credential Guard is enabled.
  • Addresses an issue that causes the Trusted Platform Module (TPM) initialization to fail with system event error 14 and prevents Windows from accessing the TPM.
  • Addresses an issue that causes communication with the TPM to time out and fail.
  • Addresses an issue that prevents hash signing using the Microsoft Platform Crypto Provider for TPMs from working correctly. This issue might also affect networking software, such as VPN applications.
  • Addresses an issue that prevents applications running in an Azure Active Directory environment from receiving account change notifications. This occurs when using the Web Account Manager (WAM) and the WebAccountMonitor API.
  • Addresses an issue that causes systems to stop working with a 0x3B stop code when running a binary that is signed by a revoked certificate.
  • Addresses an issue with merging Windows Defender Application Control policies that sometimes generates a duplicate rule ID error and causes the Merge-CIPolicy PowerShell command to fail.
  • Addresses an issue that prevents a user’s PIN from being changed after connecting the device to Microsoft Workplace Join.
  • Addresses an issue that fails to print content that is outside of the margins of a document.
  • Addresses an issue that prevents Microsoft Internet Information Services (IIS) management tools, such as IIS Manager, from managing an ASP.NET application that has configured SameSite cookie settings in web.config.
  • Addresses an issue that causes Microsoft Edge to stop working if you attempt to use paste functionality on webpages when cut-and-paste functionality has been disabled using a policy and Windows Defender Application Guard is active.
  • Addresses an issue that causes the Clipboard service to unexpectedly stop working.

Windows 10 version 1809 just had its support extended, and those users will get KB4550969, bringing the build number to 17763.1192. You can manually download it here, and these are the highlights:

  • Updates an issue with pasting mixed content of images and text from Microsoft Word into Internet Explorer.
  • Updates an issue that causes a text box that contains multiple lines of text to stop responding in certain scenarios.
  • Updates an issue that fails to print content that is outside of the margins of a document.

Here’s the full list of fixes:

  • Addresses an issue that occurs when a third-party application loads hidden tabs into Internet Options.
  • Addresses an issue with pasting mixed content of images and text from Microsoft Word into Internet Explorer.
  • Addresses an issue that causes a box that contains multiple lines of text to stop responding in certain scenarios.
  • Addresses an issue that prevents the first key stroke from being recognized correctly in the DataGridView cell.
  • Addresses an issue that causes an application that uses msctf.dll to stop working, and the 0xc0000005 (Access violation) exception appears.
  • Addresses an issue that prevents the correct lock screen from appearing when all of the following are true:
    • The Group Policy Object (GPO) policy “Computer ConfigurationWindows SettingsSecurity SettingsLocal PoliciesSecurity OptionsInteractive Logon: Do not require Ctrl+Alt+Del Computer” is disabled.
    • The GPO policy “Computer ConfigurationAdministrative TemplatesSystemLogonTurn off app notifications on the lock screen” is enabled.
    • The registry key HKLMSOFTWAREPoliciesMicrosoftWindowsSystemDisableLogonBackgroundImage is set to 1.
  • Addresses a reliability issue in WDF01000.sys.
  • Addresses an issue that causes a KERNEL_SECURITY_CHECK_FAILURE (139) stop error when Windows resumes from Sleep and turns on certain Bluetooth headsets.
  • Addresses an issue that causes the Event Viewer Microsoft Management Console (MMC) to stop working when the secondary monitor is above the primary monitor. An out of bounds exception appears.
  • Addresses an issue that causes an error in logman.exe. The error is, “A user account is required in order to commit the current Data collector Set properties.”
  • Addresses an issue that prevents users from setting the REG_EXPAND_SZ keys in some automated scenarios.
  • Addresses an issue that causes a memory leak in the LsaIso.exe process when the server is under a heavy authentication load and Credential Guard is enabled.
  • Addresses an issue that prevents hash signing using the Microsoft Platform Crypto Provider for TPMs from working correctly. This issue might also affect networking software, such as VPN applications.
  • Addresses an issue with merging Windows Defender Application Control policies that sometimes generates a duplicate rule ID error and causes the Merge-CIPolicy PowerShell command to fail.
  • Addresses an issue that prevents a user’s PIN from being changed after connecting the device to Microsoft Workplace Join.
  • Addresses an issue that prevents applications running in an Azure Active Directory environment from receiving account change notifications. This occurs when using the Web Account Manager (WAM) and the WebAccountMonitor API.
  • Addresses an issue that fails to print content that is outside of the margins of a document.
  • Addresses an issue that prevents Microsoft Internet Information Services (IIS) management tools, such as IIS Manager, from managing an ASP.NET application that has configured SameSite cookie settings in web.config.
  • Addresses an issue that causes high CPU usage on Active Directory (AD) domain controllers when migrating to Windows Server 2019. This increases latency in Microsoft Exchange operations, causes Managed Store contention, and severely impacts index creation in Active Directory and the Global Catalog’s performance.
  • Addresses an issue that logs incorrect Internet Protocol (IP) addresses in the audit logs because of missing or old data for active requests coming from “windowstransport/usernamemixed/certificatemixed” endpoints.
  • Addresses an issue that causes devices that are provisioned for Windows Hello for Business (WHfB) to fail. Registration occasionally fails, which leads to a delay in WHfB enrollment and, in some instances, creates Conflicting Objects (CNF) in the Active Directory “Registered Device” container.
  • Addresses an issue that might cause a deadlock in the Remote Desktop Gateway service.
  • Addresses an issue that might cause the Remote Desktop Gateway service to stop working.
  • Addresses an issue that causes systems to stop working with a 0x3B stop code when running a binary that is signed by a revoked certificate.
  • Addresses an issue that prevents the Notification State registries from being deleted for certain apps even after the user profile is deleted.
  • Addresses an issue that causes stop error 0x18 (REFERENCE_BY_POINTER) when Remote Desktop sessions redirect devices that are not input devices.

This one does have one known issue to be aware of:

Symptom Workaround
After installing KB4493509, devices with some Asian language packs installed may receive the error, “0x800f0982 – PSFX_E_MATCHING_ COMPONENT_NOT_FOUND.”
  1. Uninstall and reinstall any recently added language packs. For instructions, see Manage the input and display language settings in Windows 10.
  2. Select Check for Updates and install the April 2019 Cumulative Update. For instructions, see Update Windows 10.

Note If reinstalling the language pack does not mitigate the issue, reset your PC as follows:

  1. Go to the Settings app > Recovery.
  2. Select Get Started under the Reset this PC recovery option.
  3. Select Keep my Files.

Microsoft is working on a resolution and will provide an update in an upcoming release.


For those running Windows 10 version 1803, which is only supported for Enterprise and Education SKUs, you’ll get KB4550944, bringing the build number to 17134.1456. You can manually download it here, and there’s one highlight:

  • Updates an issue with pasting mixed content of images and text from Microsoft Word into Internet Explorer.

Here’s the full list of fixes:

  • Addresses an issue that occurs when a third-party application loads hidden tabs into Internet Options.
  • Addresses an issue with pasting mixed content of images and text from Microsoft Word into Internet Explorer.
  • Addresses an issue that prevents the first key stroke from being recognized correctly in the DataGridView cell.
  • Addresses an issue that causes an error in logman.exe. The error is, “A user account is required in order to commit the current Data collector Set properties.”
  • Addresses an issue that prevents users from setting the REG_EXPAND_SZ keys in some automated scenarios.
  • Addresses an issue that causes a memory leak in the LsaIso.exe process when the server is under a heavy authentication load and Credential Guard is enabled.
  • Addresses an issue with running klist.exe that causes lsass.exe to stop working and generates an access violation error (0xC0000005).
  • Addresses an issue with merging Windows Defender Application Control policies that sometimes generates a duplicate rule ID error and causes the Merge-CIPolicy PowerShell command to fail.
  • Addresses an issue that prevents applications running in an Azure Active Directory environment from receiving account change notifications. This occurs when using the Web Account Manager (WAM) and the WebAccountMonitor API.
  • Addresses a Task Manager CPU frequency display issue that locks to the base frequency on devices equipped with certain CPUs.
  • Addresses an issue that prevents Microsoft Internet Information Services (IIS) management tools, such as IIS Manager, from managing an ASP.NET application that has configured SameSite cookie settings in web.config.
  • Addresses an issue that occurs when you try to sign in to Windows during recovery mode. The error, “No administrator accounts are available on this machine”, appears.
  • Addresses an issue that prevents you from removing some local users from local built-in groups. For example, you cannot remove “Guest” from the “Guests” local group.
  • Addresses an issue that prevents certain apps from installing if they are published using a Group Policy Object.
  • Addresses an issue that causes Microsoft Edge to stop working if you attempt to use paste functionality on webpages when cut-and-paste functionality has been disabled using a policy and Windows Defender Application Guard is active.

Finally, Windows 10 version 1607 is still supported for LTSB and Windows Server 2016 customers, and they’ll get KB4550947, bringing the build number to 14393.3659. You can manually download it here, and it has the same one highlight:

  • Updates an issue with pasting mixed content of images and text from Microsoft Word into Internet Explorer.

Here’s the full list of fixes:

  • Addresses an issue with pasting mixed content of images and text from Microsoft Word into Internet Explorer.
  • Addresses an issue with Dynamic Data Exchange (DDE) that causes a memory leak when multiple clients connect to the same server.
  • Addresses an issue that causes new child windows to flicker and appear as white squares on server devices that are configured for stark visual contrast.
  • Addresses an issue that causes an error in logman.exe. The error is, “A user account is required in order to commit the current Data collector Set properties.”
  • Addresses an issue that causes a memory leak in the LsaIso.exe process when the server is under a heavy authentication load and Credential Guard is enabled.
  • Addresses an issue that might cause a delay of up to two minutes when signing in or unlocking a session on Hybrid Azure Active Directory-joined machines.
  • Addresses an issue with running klist.exe that causes lsass.exe to stop working and generates an access violation error (0xC0000005).
  • Addresses an issue with merging Windows Defender Application Control policies that sometimes generates a duplicate rule ID error and causes the Merge-CIPolicy PowerShell command to fail.
  • Addresses an issue that might prevent Dynamic Host Configuration Protocol (DHCP) servers from providing the right options to clients when a reservation exists.
  • Addresses an issue that prevents Microsoft Internet Information Services (IIS) management tools, such as IIS Manager, from managing an ASP.NET application that has configured SameSite cookie settings in web.config.
  • Addresses an issue that causes devices that are provisioned for Windows Hello for Business (WHfB) to fail. Registration occasionally fails, which leads to a delay in WHfB enrollment and, in some instances, creates Conflicting Objects (CNF) in the Active Directory “Registered Device” container.
  • Addresses an issue that occurs when you try to sign in to Windows during recovery mode. The error, “No administrator accounts are available on this machine”, appears.
  • Addresses an issue that prevents you from removing some local users from local built-in groups. For example, you cannot remove “Guest” from the “Guests” local group.
  • Addresses an issue that logs incorrect Internet Protocol (IP) addresses in the audit logs because of missing or old data for active requests coming from “windowstransport/usernamemixed/certificatemixed” endpoints.
  • Addresses an issue that might cause a deadlock in the Remote Desktop Gateway service.
  • Addresses an issue in Srv2.sys that might cause 0x18, 0xC2, and 0x19 errors.
  • Addresses an issue that prevents the Notification State registries from being deleted for certain apps even after the user profile is deleted.

This one also has one known issue:

Symptom Workaround
After installing KB4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters.

Set the domain default “Minimum Password Length” policy to less than or equal to 14 characters.

Microsoft is working on a resolution and will provide an update in an upcoming release.


As mentioned earlier, these updates are optional. That means that you can get it through Windows Update if you opt into it, or you can install it manually. If you choose to not take the update, these fixes will be bundled into next month’s Patch Tuesday updates.

Related:

  • No Related Posts

Microsoft Exchange: 355000 Servers Lack Critical Patch

Governance & Risk Management , IT Risk Management , Patch Management

Fix Released in February Only Installed on 18 Percent of Servers, Rapid7 WarnsMathew J. Schwartz (euroinfosec) • April 8, 2020

Microsoft Exchange: 355,000 Servers Lack Critical Patch
Rapid7: Any attempts to exploit CVE-2020-0688 will leave artifacts in the Windows and IIS logs, including the name of the legitimate user account that was used.

Patch or perish alert: Less than than 20 percent of all Microsoft Exchange servers have received a fix for a serious flaw Microsoft first disclosed nearly two months ago, security firm Rapid7 warns.

See Also:Live Webinar | Can Medium-Sized Companies Automate Access to Critical Multi-Cloud IT Environments?

“As of March 24, there were over 350,000 Exchange servers exposing a version of the software that has this vulnerability,” writes Tom Sellers, a senior manager at Boston-based Rapid7 Labs, in a blog post.

The vulnerability could allow a remote attacker “to turn any stolen Exchange user account into a complete system compromise,” he says. “In many implementations, this could be used to completely compromise the entire Exchange environment – including all email – and potentially all of Active Directory” (see: Why Hackers Abuse Active Directory).

Microsoft addressed the remote-code-execution vulnerability – designated CVE-2020-0688 – via security updates it released on Feb. 11 for all supported versions of Microsoft Exchange. At least at that point, the flaw didn’t appear to have been targeted in the wild, the company said. The flaw was reported to Microsoft by an anonymous researcher via Trend Micro’s Zero Day Initiative.

“A remote-code-execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at install time,” Microsoft said in its security alert. “Knowledge of the validation key allows an authenticated user with a mailbox to pass arbitrary objects to be deserialized by the web application, which runs as SYSTEM. The security update addresses the vulnerability by correcting how Microsoft Exchange creates the keys during install.”

Security Updates Include Patch

To fix the flaw, Microsoft pushed security updates for four base versions of Exchange:

  • Exchange Server 2010 service pack 3 update rollup 30;
  • Exchange Server 2013 cumulative update 23;
  • Exchange Server 2016 cumulative update 14;
  • Exchange Server 2016 cumulative update 15;
  • Exchange Server 2019 cumulative update 3;
  • Exchange Server 2019 cumulative update 4.

But the vast majority of these servers remain unpatched, according to a survey conducted by Project Sonar, Rapid7’s in-house internet scanning project (see: Is COVID-19 Driving a Surge in Unsafe Remote Connectivity?).

“On March 24, we used Project Sonar to survey the internet for publicly facing Exchange Outlook Web App – OWA – services,” Sellers says. “What we found was that at least 357,629 (82.5 percent) of the 433,464 Exchange servers we observed were known to be vulnerable.”

Subsequently, Sellers added a caveat that 35,000 fewer servers might be vulnerable, owing to Microsoft’s fix for Exchange 2010 not updating the visible build information, meaning that scans alone could not tell if an Exchange 2010 system had been updated. Instead, organizations will need to manually verify that every such system has the update. Sellers says they should do the same for all Exchange 2013 and newer systems, noting that the build number alone should indicate if the relevant update is in place.

Check for Compromise

Rapid7 also recommends all organizations that use Exchange search for any signs that they have been compromised via this flaw.

“The exploit code that we tested with left log artifacts in the Windows Event Log and the IIS [Internet Information Services] logs on both patched and unpatched servers,” Sellers says, noting that the log error message will also name the compromised user account.

“You will see the username of the compromised account name at the end of the log entry,” according to Rapid7’s Tom Sellers

Because the attack requires a valid Exchange user account to succeed, “any user accounts seen in these exploitation attempts should be considered compromised,” Sellers says.

But Wait, There’s More

Unfortunately, the Project Sonar scans revealed more widespread problems than a lack of CVE-2020-0688 patching. Notably, Rapid7 researchers found 31,000 Exchange 2010 servers online that had received no updates since 2012, as well as 800 Exchange 2010 servers that have never been updated. It also saw 10,371 Exchange 2007 servers.

“In addition to the high numbers of servers that are missing multiple updates, there is a concerning number of Exchange 2007 and 2010 servers,” Sellers says, although he notes that Exchange 2007 is not vulnerable to CVE-2020-0688. Even so, the unsupported operating system long ago stopped receiving security updates, and now has a raft of critical flaws that attackers could exploit. “Exchange 2007 transitioned to ‘end of support’ status nearly three years ago, on April 11, 2017,” he says. “No security updates, bug fixes, time zone updates, etc., are provided after that date.”

Exchange 2010 was scheduled to reach end of support on Jan. 14, although that’s now been postponed until Oct. 13, 2020. “There are over 166,000 of these servers connected to the internet,” Sellers says. “That’s a staggering number of enterprise-class mail systems that will be unsupported in a few months.”

Related:

Receiving “Legacy System Extension” Dialog Box After Upgrading To macOS Catalina 10.15.4+

USB Generic redirection is the main component utilizing kernel extensions. Apple is deprecating the use of Kernel extensions in upcoming releases of macOS.

The warning is to inform us before moving forward with the deprecation.

In the event Apple deprecates it in the next release, only Generic USB redirection will be affected, and will not allow the use of said feature.

Related:

  • No Related Posts

Local Monitors are not Blanked when Connecting via ICA to Remote PC with AMD GPU

Add the following registry value to the Remote PC VDA 7.16 and above:

Key:

HKEY_LOCAL_MACHINESoftwareCitrixGraphicsAdapterMerits

Value:

Name: CitrixIDD

Type: DWORD

Data: 3

This forces the Citrix Graphics stack to use the Citrix Indirect Display Driver instead of the AMD GPU for remote sessions.

The Indirect Display Driver is not present on VDA 7.15, so users will need to upgrade to a current release to benefit from this.

Related:

Android for Work: “You have already signed up with this enterprise.”

When setting up Android for Work in a new Endpoint Management Environment following the documentation, once redirected to Google for enabling Android for Work in the Google Account, an error is displayed:

“You have already signed up with this enterprise.”

User-added image

It is not possible to download the enterprise.config file to finish the Android for Work Setup in Endpoint Management.

Related: