Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment

Posted on August 7, 2025August 7, 2025 By CWS

Microsoft on Wednesday knowledgeable organizations a few high-severity vulnerability affecting hybrid deployments of Change Server.

In accordance with Microsoft, the vulnerability, tracked as CVE-2025-53786, might be exploited by an attacker to escalate privileges.  

“In an Change hybrid deployment, an attacker who first positive factors administrative entry to an on-premises Change server may doubtlessly escalate privileges inside the group’s related cloud setting with out leaving simply detectable and auditable hint,” Microsoft defined. “This danger arises as a result of Change Server and Change On-line share the identical service principal in hybrid configurations.”

The problem, reported by Dirk-jan Mollema of Outsider Safety, has been patched in Change Server 2016, 2019 and Subscription Version RTM.

Microsoft’s advisory signifies that the vulnerability has not been exploited within the wild, however its exploitability evaluation is ‘exploitation extra probably’.

CISA has additionally revealed an alert for CVE-2025-53786, saying that, whereas Microsoft has not seen any in-the-wild assaults, organizations are strongly urged to implement patches and mitigations “or danger leaving the group susceptible to a hybrid cloud and on-premises whole area compromise”. 

Microsoft on Wednesday additionally revealed a weblog put up to remind prospects about just lately introduced modifications to Change hybrid environments.

“Beginning in August 2025, we are going to start briefly blocking Change Net Providers (EWS) visitors utilizing the Change On-line shared service principal (which is by default utilized by some coexistence options in hybrid situations),” the corporate defined. Commercial. Scroll to proceed studying.

It added, “This is part of a phased technique to hurry up buyer adoption of the devoted Change hybrid app and making our buyer’s environments safer.”

It’s not unusual for menace actors to focus on Change Server cases. CISA’s Identified Exploited Vulnerabilities catalog at the moment consists of 17 Change flaws exploited since 2018.

Associated: Microsoft Paid Out $17 Million in Bug Bounties in Previous 12 months

Associated: Development Micro Warns of Apex One Vulnerabilities Exploited in Wild

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Security Week News Tags:Deployment, Exchange, Hybrid, Microsoft, Organizations, Vulnerability, Warned

Post navigation

Previous Post: What 2025 Is Teaching Us About Cloud Defense
Next Post: New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data

Related Posts

Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network Security Week News
Browser Extensions Pose Serious Threat to Gen-AI Tools Handling Sensitive Data  Security Week News
Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Security Week News
Compyl Raises $12 Million for GRC Platform Security Week News
Maze Banks $25M to Tackle Cloud Security with AI Agents Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News