Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment

Posted on August 7, 2025August 7, 2025 By CWS

Microsoft on Wednesday knowledgeable organizations a few high-severity vulnerability affecting hybrid deployments of Change Server.

In accordance with Microsoft, the vulnerability, tracked as CVE-2025-53786, might be exploited by an attacker to escalate privileges.  

“In an Change hybrid deployment, an attacker who first positive factors administrative entry to an on-premises Change server may doubtlessly escalate privileges inside the group’s related cloud setting with out leaving simply detectable and auditable hint,” Microsoft defined. “This danger arises as a result of Change Server and Change On-line share the identical service principal in hybrid configurations.”

The problem, reported by Dirk-jan Mollema of Outsider Safety, has been patched in Change Server 2016, 2019 and Subscription Version RTM.

Microsoft’s advisory signifies that the vulnerability has not been exploited within the wild, however its exploitability evaluation is ‘exploitation extra probably’.

CISA has additionally revealed an alert for CVE-2025-53786, saying that, whereas Microsoft has not seen any in-the-wild assaults, organizations are strongly urged to implement patches and mitigations “or danger leaving the group susceptible to a hybrid cloud and on-premises whole area compromise”. 

Microsoft on Wednesday additionally revealed a weblog put up to remind prospects about just lately introduced modifications to Change hybrid environments.

“Beginning in August 2025, we are going to start briefly blocking Change Net Providers (EWS) visitors utilizing the Change On-line shared service principal (which is by default utilized by some coexistence options in hybrid situations),” the corporate defined. Commercial. Scroll to proceed studying.

It added, “This is part of a phased technique to hurry up buyer adoption of the devoted Change hybrid app and making our buyer’s environments safer.”

It’s not unusual for menace actors to focus on Change Server cases. CISA’s Identified Exploited Vulnerabilities catalog at the moment consists of 17 Change flaws exploited since 2018.

Associated: Microsoft Paid Out $17 Million in Bug Bounties in Previous 12 months

Associated: Development Micro Warns of Apex One Vulnerabilities Exploited in Wild

Associated: Flaws Expose 100 Dell Laptop computer Fashions to Implants, Home windows Login Bypass

Security Week News Tags:Deployment, Exchange, Hybrid, Microsoft, Organizations, Vulnerability, Warned

Post navigation

Previous Post: What 2025 Is Teaching Us About Cloud Defense
Next Post: New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data

Related Posts

Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Security Week News
Promptfoo Raises $18.4 Million for AI Security Platform Security Week News
Fortinet, Ivanti, Nvidia Release Security Updates Security Week News
In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach Security Week News
SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations Security Week News
Insight Partners Confirms Data Breach Result of Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Scattered Spider Suspect Arrested in US
  • Hackers Abusing GitHub Notifications to Deliver Phishing Emails
  • GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
  • Automotive Titan Stellantis Discloses Data Breach
  • BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Scattered Spider Suspect Arrested in US
  • Hackers Abusing GitHub Notifications to Deliver Phishing Emails
  • GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
  • Automotive Titan Stellantis Discloses Data Breach
  • BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News