PT-2025-32193 · Microsoft · Exchange Server
Dirk-Jan Mollema
+1
·
Published
2025-04-18
·
Updated
2025-09-24
·
CVE-2025-53786
8.0
High
Base vector | Vector | AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions**
Microsoft Exchange Server (affected versions not specified)
**Description**
This vulnerability affects Microsoft Exchange Server in hybrid deployments. An attacker gaining administrative access to an on-premises Exchange server may be able to escalate privileges and gain unauthorized access to Exchange Online, potentially compromising the cloud environment. Exploitation may occur without generating detectable logs, enabling silent cloud access and hindering traditional auditing methods. The vulnerability stems from a shared service principal between on-premises and Exchange Online environments. Over 28,000 IPs were found unpatched as of August 7, 2025, with the US, Germany, and Russia being the top affected countries. CISA has issued an emergency directive mandating federal agencies to address this vulnerability by August 11, 2025.
**Recommendations**
Install the April 2025 (or later) Hot Fix and implement the changes outlined in the April 18th, 2025 announcement.
Reset service principal credentials.
Run the Exchange Health Checker.
If hybrid Exchange is only used for SMTP relay, recipient management, and migrations, run the mitigation script detailed in the Exchange team blog post from the original announcement.
Consider disconnecting outdated servers.
Fix
LPE
RCE
Improper Authentication
Weakness Enumeration
Related Identifiers
Affected Products
References · 209
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53786 · Security Note
- https://bdu.fstec.ru/vul/2025-09477 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-53786 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786 · Vendor Advisory
- https://twitter.com/hackplayers/status/1953467440592998564 · Twitter Post
- https://twitter.com/NetizenCorp/status/1954922830929203692 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1mmeqj6/top_10_trending_cves_10082025 · Reddit Post
- https://twitter.com/poulsen_hacks/status/1954305821627859267 · Twitter Post
- https://twitter.com/windowsforum/status/1953353366098063663 · Twitter Post
- https://twitter.com/socradar/status/1954801171073229053 · Twitter Post
- https://twitter.com/CYPHERHACKER80/status/1958201867659317355 · Twitter Post
- https://twitter.com/Broadleaf_Group/status/1954970176572547499 · Twitter Post
- https://twitter.com/Dinosn/status/1953351165237760333 · Twitter Post
- https://twitter.com/RedSiege/status/1955362951793148157 · Twitter Post
- https://twitter.com/CosmicMetaX/status/1954966420208439541 · Twitter Post