Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online

Posted on August 9, 2025August 9, 2025 By CWS

Over 28,000 unpatched Microsoft Trade servers are uncovered on the general public web and stay weak to a crucial safety flaw designated CVE-2025-53786, based on new scanning knowledge launched on August 7, 2025, by The Shadowserver Basis.

The Cybersecurity and Infrastructure Safety Company (CISA) issued Emergency Directive 25-02 on August 7, mandating federal businesses to handle this high-severity vulnerability in Microsoft Trade hybrid deployments by 9:00 AM ET on Monday, August 11.

The flaw, carrying a CVSS rating of 8.0 out of 10, permits attackers with administrative entry to on-premises Trade servers to escalate privileges inside linked Microsoft 365 cloud environments with out leaving simply detectable audit trails.

The vulnerability scans reveal that the US, Germany, and Russia characterize the highest three international locations with the very best concentrations of uncovered weak servers.

These findings come as Microsoft and CISA warn of “vital, unacceptable danger” to organizations working Trade hybrid configurations that haven’t carried out the April 2025 safety steering.

The vulnerability’s origins hint again to April 18, 2025, when Microsoft introduced Trade Server Safety Modifications for Hybrid Deployments alongside a non-security hotfix replace.

Initially introduced as normal safety enhancements, Microsoft later recognized particular safety implications requiring CVE task following additional investigation.

The corporate now strongly recommends putting in the April 2025 hotfix or later and implementing configuration modifications in Trade Server hybrid environments.

The flaw exists as a result of Trade Server and Trade On-line share the identical service principal in hybrid configurations, making a pathway for privilege escalation assaults.

Safety researcher Dirk-Jan Mollema from Outsider Safety, who reported the vulnerability, demonstrated the exploit at Black Hat USA 2025, exhibiting how menace actors can forge authentication tokens that stay legitimate for twenty-four hours whereas bypassing conditional entry insurance policies.

Microsoft has labeled the vulnerability as “Exploitation Extra Probably” regardless of no confirmed lively exploitation as of the disclosure date.

Nonetheless, CISA Appearing Director Madhu Gottumukkala emphasised the urgency, stating the company is “taking pressing motion to mitigate this vulnerability that poses a major, unacceptable danger to the federal programs upon which Individuals rely”.

Organizations should set up Microsoft’s April 2025 Trade Server hotfix updates, deploy devoted Trade hybrid functions, and clear up legacy service principal credentials.

Microsoft plans to completely block Trade Internet Companies visitors utilizing the shared service principal after October 31, 2025, as a part of its transition to a safer Graph API structure.

CISA strongly encourages all organizations, not simply federal businesses, to implement the emergency directive steering to stop potential complete area compromise of each on-premises and cloud environments.

Equip your SOC with full entry to the most recent menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:CVE202553786, Exchange, Exposed, Microsoft, Online, Servers, Vulnerable

Post navigation

Previous Post: CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks
Next Post: DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation

Related Posts

Breaking Down Silos Aligning IT and Security Teams Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
SolarWinds Dameware Remote Control Service Vulnerability Allows Privilege Escalation Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Cyber Security News
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News
TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
  • ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
  • Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
  • ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News