New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation

New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation

Microsoft has disclosed a high-severity security vulnerability affecting Exchange Server hybrid deployments that could allow attackers with administrative access to escalate privileges and potentially compromise an organization’s entire cloud and on-premises infrastructure.

The vulnerability, tracked as CVE-2025-53786, was announced on August 6, 2025, prompting immediate action from cybersecurity agencies worldwide.

Vulnerability Overview

The Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability represents a significant security concern for organizations running hybrid Exchange environments.

This flaw allows cyber threat actors who have already obtained administrative access to an on-premises Microsoft Exchange server to escalate their privileges by exploiting vulnerable hybrid-joined configurations.

The vulnerability specifically targets the authentication mechanisms in hybrid deployments, potentially compromising the identity integrity of an organization’s Exchange Online service.

The vulnerability carries a CVSS score of 8.0 out of 10, categorized as “Important” severity by Microsoft.

The attack vector requires network access with high attack complexity, high privileges required, but no user interaction, and can result in a complete scope change with high impact on confidentiality, integrity, and availability.

CVE Details Information
CVE ID CVE-2025-53786
Release Date August 6, 2025
Severity Important (8.0/7.0 CVSS)
Impact Elevation of Privilege
Weakness CWE-287: Improper Authentication
Vector String CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Assigning CNA Microsoft

The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent guidance regarding this vulnerability, emphasizing that while Microsoft reports no observed exploitation at the time of disclosure, organizations must act swiftly to prevent potential compromise.

CISA strongly warns that failure to address this vulnerability could result in “hybrid cloud and on-premises total domain compromise”.

Organizations utilizing Exchange hybrid deployments are advised to immediately review Microsoft’s security guidance and implement the recommended mitigation strategies.

These include installing the April 2025 Exchange Server Hotfix Updates on on-premises Exchange servers and following Microsoft’s configuration instructions for deploying dedicated Exchange hybrid applications.

For organizations currently using or previously configured with Exchange hybrid environments, Microsoft recommends reviewing the Service Principal Clean-Up Mode guidance to reset service principal keyCredentials.

Additionally, organizations should run the Microsoft Exchange Health Checker to determine if additional remediation steps are required.

CISA has also recommended that organizations disconnect public-facing versions of Exchange Server or SharePoint Server that have reached end-of-life from the internet, particularly SharePoint Server 2013 and earlier versions.

The Ultimate SOC-as-a-Service Pricing Guide for 2025– Download for Free


Source link