CVE-2025-53786
vulnerability analysis and mitigation

Overview

On August 6, 2025, Microsoft disclosed CVE-2025-53786, a high-severity post-authentication vulnerability affecting on-premises Microsoft Exchange servers configured for hybrid-joined environments. The vulnerability was initially addressed through a non-security hotfix and configuration guidance released in April 2025, which was later identified as a specific security issue. The vulnerability impacts Exchange Server hybrid deployments where Exchange Server and Exchange Online share the same service principal in hybrid configurations (Arctic Wolf, CISA).

Technical details

The vulnerability was presented at Black Hat 2025 by its discoverer. In hybrid environments, Exchange Server uses a certificate to authenticate to Exchange Online via OAuth. The vulnerability has a CVSS 3.1 Base Score of 8.0 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H. The weakness is classified as CWE-287 (Improper Authentication) (NVD, Arctic Wolf).

Impact

If exploited, the vulnerability allows an authenticated threat actor with administrative access to an on-premises Exchange server to escalate privileges within the connected Microsoft 365 environment. The attacker can request service tokens from Microsoft's Access Control Service (ACS), which can be used to impersonate hybrid users and gain broad access to Exchange Online and SharePoint, bypassing Conditional Access policies and leaving minimal logging. These tokens remain valid for up to 24 hours (Arctic Wolf).

Mitigation and workarounds

Organizations are strongly advised to implement Microsoft's Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability guidance. This includes installing the April 2025 Exchange Server Hotfix Updates on the on-premise Exchange server, following Microsoft's configuration instructions to deploy dedicated Exchange hybrid app, and reviewing Microsoft's Service Principal Clean-Up Mode for guidance on resetting the service principal's keyCredentials. CISA recommends organizations first inventory all Exchange Servers on their networks and run the Microsoft Exchange Health Checker to identify the Cumulative Update level of each Exchange Server (CISA).

Community reactions

The U.S. CISA issued Emergency Directive (ED) 25-02 in response to the vulnerability, requiring federal agencies to patch by August 11, 2025. Spain's INCIBE-CERT was noted as the only other country to issue a government advisory for the vulnerability at the time (Arctic Wolf).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management