Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Posted on August 7, 2025August 7, 2025 By CWS

Aug 07, 2025Ravie LakshmananVulnerability / Risk Detection
Microsoft has launched an advisory for a high-severity safety flaw affecting on-premise variations of Change Server that might permit an attacker to achieve elevated privileges below sure circumstances.
The vulnerability, tracked as CVE-2025-53786, carries a CVSS rating of 8.0. Dirk-jan Mollema with Outsider Safety has been acknowledged for reporting the bug.
“In an Change hybrid deployment, an attacker who first positive factors administrative entry to an on-premises Change server might probably escalate privileges throughout the group’s related cloud setting with out leaving simply detectable and auditable traces,” the tech large stated within the alert.
“This threat arises as a result of Change Server and Change On-line share the identical service principal in hybrid configurations.”
Profitable exploitation of the flaw might permit an attacker to escalate privileges throughout the group’s related cloud setting with out leaving simply detectable and auditable traces, the corporate added. Nonetheless, the assault hinges on the risk actor already having administrator entry to an Change Server.

The U.S. Cybersecurity and Infrastructure Safety Company (CISA), in a bulletin of its personal, stated the vulnerability might affect the id integrity of a corporation’s Change On-line service if left unpatched.
As mitigations, clients are really useful to evaluation Change Server safety modifications for hybrid deployments, set up the April 2025 Scorching Repair (or newer), and comply with the configuration directions.

“In case you’ve beforehand configured Change hybrid or OAuth authentication between Change Server and your Change On-line group however now not use it, make certain to reset the service principal’s keyCredentials,” Microsoft stated.
The event comes because the Home windows maker stated it’ll start briefly blocking Change Net Providers (EWS) site visitors utilizing the Change On-line shared service principal beginning this month in an effort to extend the client adoption of the devoted Change hybrid app and enhance the safety posture of the hybrid setting.
Microsoft’s advisory for CVE-2025-53786 additionally coincides with CISA’s evaluation of assorted malicious artifacts deployed following the exploitation of not too long ago disclosed SharePoint flaws, collectively tracked as ToolShell.

This consists of two Base64-encoded DLL binaries and 4 Lively Server Web page Prolonged (ASPX) information which are designed to retrieve machine key settings inside an ASP.NET software’s configuration and act as an online shell to execute instructions and add information.
“Cyber risk actors might leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint the host system and exfiltrate knowledge,” the company stated.
CISA can also be urging entities to disconnect public-facing variations of Change Server or SharePoint Server which have reached their end-of-life (EOL) or end-of-service from the web, to not point out discontinue using outdated variations.

The Hacker News Tags:Access, Cloud, Discloses, Enabling, Exchange, Flaw, Hybrid, Microsoft, Server, Setups, Silent

Post navigation

Previous Post: 6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
Next Post: What 2025 Is Teaching Us About Cloud Defense

Related Posts

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency The Hacker News
CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials The Hacker News
5 Lessons from River Island The Hacker News
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft The Hacker News
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News