PT-2025-32193 · Microsoft · Exchange Server
Dirk-Jan Mollema
+1
·
Published
2025-04-18
·
Updated
2025-08-31
·
CVE-2025-53786
8.0
High
Base vector | Vector | AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Microsoft Exchange Server versions prior to the April 2025 Hot Fix.
**Description:**
A critical elevation of privilege vulnerability exists in Microsoft Exchange Server hybrid deployments. This flaw allows attackers who have gained administrative access to an on-premises Exchange Server to escalate their privileges and potentially compromise cloud environments, including Microsoft 365. The vulnerability stems from a shared service principal used between on-premises and online Exchange environments, enabling attackers to forge trusted tokens for cloud access without generating logs, making detection difficult. Over 29,000 Exchange servers were reported as unpatched and vulnerable as of August 7, 2025. CISA issued an emergency directive mandating federal agencies to patch systems by August 11, 2025.
**Recommendations:**
Apply the April 2025 (or later) Hot Fix and implement the changes documented in the April 18th, 2025 announcement. For hybrid deployments, consider rearchitecting identity boundaries to mitigate the risk of privilege escalation. If you are running hybrid Exchange, ensure you apply the latest security updates and, if applicable, run the mitigation script.
Fix
LPE
RCE
Improper Authentication
Weakness Enumeration
Related Identifiers
Affected Products
References · 204
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53786 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-09477 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-53786 · Security Note
- https://twitter.com/CVEnew/status/1953137476169543805 · Twitter Post
- https://twitter.com/TLITLansing/status/1953229637750014059 · Twitter Post
- https://twitter.com/HarborcoatIntel/status/1953618228996927859 · Twitter Post
- https://twitter.com/Andrewkek77/status/1953790313215979757 · Twitter Post
- https://twitter.com/allaboutclait/status/1953536787365904479 · Twitter Post
- https://twitter.com/HunterMapping/status/1953728578928955889 · Twitter Post
- https://twitter.com/FORTBRIDGE/status/1953712790310465856 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1mlsr1y/microsoft_releases_guidance_on_highseverity · Reddit Post
- https://twitter.com/CISACyber/status/1953251518359929253 · Twitter Post
- https://twitter.com/Dav3Shanahan/status/1953503435166560756 · Twitter Post
- https://twitter.com/Security__Wire/status/1953615507321659631 · Twitter Post