Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment

CISA and Microsoft have issued advisories for CVE-2025-53786, a high-severity flaw allowing privilege escalation in cloud environments. 

Microsoft vulnerability

Microsoft on Wednesday informed organizations about a high-severity vulnerability affecting hybrid deployments of Exchange Server.

According to Microsoft, the vulnerability, tracked as CVE-2025-53786, can be exploited by an attacker to escalate privileges.  

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace,” Microsoft explained. “This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations.”

The issue, reported by Dirk-jan Mollema of Outsider Security, has been patched in Exchange Server 2016, 2019 and Subscription Edition RTM.

Microsoft’s advisory indicates that the vulnerability has not been exploited in the wild, but its exploitability assessment is ‘exploitation more likely’.

CISA has also published an alert for CVE-2025-53786, saying that, while Microsoft has not seen any in-the-wild attacks, organizations are strongly urged to implement patches and mitigations “or risk leaving the organization vulnerable to a hybrid cloud and on-premises total domain compromise”. 

Advertisement. Scroll to continue reading.

Microsoft on Wednesday also published a blog post to remind customers about recently announced changes to Exchange hybrid environments.

“Starting in August 2025, we will begin temporarily blocking Exchange Web Services (EWS) traffic using the Exchange Online shared service principal (which is by default used by some coexistence features in hybrid scenarios),” the company explained. 

It added, “This is a part of a phased strategy to speed up customer adoption of the dedicated Exchange hybrid app and making our customer’s environments more secure.”

It’s not uncommon for threat actors to target Exchange Server instances. CISA’s Known Exploited Vulnerabilities catalog currently includes 17 Exchange flaws exploited since 2018.

Related: Microsoft Paid Out $17 Million in Bug Bounties in Past Year

Related: Trend Micro Warns of Apex One Vulnerabilities Exploited in Wild

Related: Flaws Expose 100 Dell Laptop Models to Implants, Windows Login Bypass

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.