
Cloud Vulnerability DB
A community-led vulnerabilities database
On August 6, 2025, Microsoft disclosed CVE-2025-53786, a high-severity post-authentication vulnerability affecting on-premises Microsoft Exchange servers configured for hybrid-joined environments. The vulnerability was initially addressed through a non-security hotfix and configuration guidance released in April 2025, which was later identified as a specific security issue. The vulnerability impacts Exchange Server hybrid deployments where Exchange Server and Exchange Online share the same service principal in hybrid configurations (Arctic Wolf, CISA).
The vulnerability was presented at Black Hat 2025 by its discoverer. In hybrid environments, Exchange Server uses a certificate to authenticate to Exchange Online via OAuth. The vulnerability has a CVSS 3.1 Base Score of 8.0 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H. The weakness is classified as CWE-287 (Improper Authentication) (NVD, Arctic Wolf).
If exploited, the vulnerability allows an authenticated threat actor with administrative access to an on-premises Exchange server to escalate privileges within the connected Microsoft 365 environment. The attacker can request service tokens from Microsoft's Access Control Service (ACS), which can be used to impersonate hybrid users and gain broad access to Exchange Online and SharePoint, bypassing Conditional Access policies and leaving minimal logging. These tokens remain valid for up to 24 hours (Arctic Wolf).
Organizations are strongly advised to implement Microsoft's Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability guidance. This includes installing the April 2025 Exchange Server Hotfix Updates on the on-premise Exchange server, following Microsoft's configuration instructions to deploy dedicated Exchange hybrid app, and reviewing Microsoft's Service Principal Clean-Up Mode for guidance on resetting the service principal's keyCredentials. CISA recommends organizations first inventory all Exchange Servers on their networks and run the Microsoft Exchange Health Checker to identify the Cumulative Update level of each Exchange Server (CISA).
The U.S. CISA issued Emergency Directive (ED) 25-02 in response to the vulnerability, requiring federal agencies to patch by August 11, 2025. Spain's INCIBE-CERT was noted as the only other country to issue a government advisory for the vulnerability at the time (Arctic Wolf).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."