Over 29,000 Microsoft Exchange servers remain unpatched against a high-severity vulnerability (CVE-2025-53786) that could allow attackers to escalate privileges and compromise entire domains, prompting urgent mitigation efforts by U.S. federal agencies and warnings for organizations worldwide.
CISA has issued a warning about a high-severity vulnerability (CVE-2025-53786) in Microsoft Exchange Server that could allow privilege escalation and impact organization identity integrity, with a demonstration of exploit at Black Hat. Microsoft is implementing measures including blocking certain traffic and promoting migration to dedicated service principals. Additionally, Microsoft announced Project Ire, an AI-powered system for autonomous malware classification, enhancing cybersecurity defenses.
CISA has issued a warning about a high-severity vulnerability (CVE-2025-53786) in Microsoft Exchange Server that could allow privilege escalation, urging organizations to follow Microsoft's guidance and disconnect vulnerable servers. Meanwhile, Microsoft has announced Project Ire, an AI-powered tool capable of autonomously analyzing and classifying malware with high precision, enhancing cybersecurity defenses.
CISA has ordered all US federal agencies to urgently patch a critical Microsoft Exchange vulnerability (CVE-2025-53786) by Monday morning, which could allow attackers with admin access to compromise entire domains through hybrid Exchange configurations. Agencies must update their systems and switch to a dedicated hybrid app to prevent potential lateral movement into cloud environments, with non-government organizations also urged to follow suit.
Microsoft and CISA have issued warnings about a high-severity Exchange Server bug (CVE-2025-53786) that could allow attackers with administrative access to escalate privileges and potentially compromise entire domains, especially in hybrid cloud environments. Organizations are urged to apply the recommended patches and follow security guidance to mitigate the risk of exploitation, which is deemed likely to occur soon.
Microsoft disclosed a high-severity vulnerability in on-premise Exchange Server (CVE-2025-53786) that could allow attackers with admin access to escalate privileges in connected cloud environments, especially in hybrid setups. The flaw, which shares a service principal with Exchange Online, poses risks of undetectable privilege escalation and identity compromise if unpatched. Microsoft recommends applying the latest hotfix, reviewing security configurations, and resetting service principal keys if no longer used. CISA also warns about related malware exploiting recent SharePoint flaws and advises disconnecting outdated or end-of-life Exchange and SharePoint servers from the internet.
Microsoft has issued a warning about a high-severity vulnerability (CVE-2025-53786) in Exchange Server hybrid deployments that could allow attackers to escalate privileges and compromise both on-premises and cloud environments, with potential for total domain takeover. The vulnerability affects Exchange Server 2016, 2019, and Subscription Edition, and Microsoft recommends applying hotfixes and following security guidelines to mitigate risks. Failure to address this issue could lead to significant security breaches, especially as exploit code may be developed for malicious use.
Originally Published 5 months ago — by CISA (.gov)
CISA warns of a high-severity vulnerability in hybrid Exchange deployments (CVE-2025-53786) that could allow privilege escalation and compromise of the organization's Exchange Online service. Organizations are advised to follow Microsoft's guidance, install hotfix updates, and disconnect end-of-life servers from the internet to mitigate risks.