
Cloud Vulnerability DB
A community-led vulnerabilities database
A spoofing vulnerability (CVE-2025-59248) was identified in Microsoft Exchange Server, disclosed on October 14, 2025. The vulnerability affects multiple versions of Microsoft Exchange Server including Exchange Server Subscription Edition RTM, Exchange Server 2019 Cumulative Update 14 and 15, and Exchange Server 2016 Cumulative Update 23 (NVD).
The vulnerability stems from improper input validation in Microsoft Exchange Server that could allow an unauthorized attacker to perform spoofing over a network. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N. This indicates that the vulnerability can be exploited remotely with low attack complexity, requires no privileges or user interaction, and primarily impacts system integrity (NVD, Rapid7).
The vulnerability primarily affects system integrity, allowing attackers to perform spoofing activities over the network. The CVSS scoring indicates high impact on integrity while confidentiality and availability remain unaffected (Rapid7).
Microsoft has released security updates to address this vulnerability. The fixes are available through the October 14, 2025 security update for affected versions of Exchange Server. Organizations are advised to apply the relevant updates: KB5066366 for Exchange Server Subscription Edition RTM, KB5066367 for Exchange Server 2019 CU15, and KB5066369 for Exchange Server 2016 CU23 (Microsoft Support).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."