Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Posted on August 7, 2025August 7, 2025 By CWS

Aug 07, 2025Ravie LakshmananVulnerability / Risk Detection
Microsoft has launched an advisory for a high-severity safety flaw affecting on-premise variations of Change Server that might permit an attacker to achieve elevated privileges below sure circumstances.
The vulnerability, tracked as CVE-2025-53786, carries a CVSS rating of 8.0. Dirk-jan Mollema with Outsider Safety has been acknowledged for reporting the bug.
“In an Change hybrid deployment, an attacker who first positive factors administrative entry to an on-premises Change server might probably escalate privileges throughout the group’s related cloud setting with out leaving simply detectable and auditable traces,” the tech large stated within the alert.
“This threat arises as a result of Change Server and Change On-line share the identical service principal in hybrid configurations.”
Profitable exploitation of the flaw might permit an attacker to escalate privileges throughout the group’s related cloud setting with out leaving simply detectable and auditable traces, the corporate added. Nonetheless, the assault hinges on the risk actor already having administrator entry to an Change Server.

The U.S. Cybersecurity and Infrastructure Safety Company (CISA), in a bulletin of its personal, stated the vulnerability might affect the id integrity of a corporation’s Change On-line service if left unpatched.
As mitigations, clients are really useful to evaluation Change Server safety modifications for hybrid deployments, set up the April 2025 Scorching Repair (or newer), and comply with the configuration directions.

“In case you’ve beforehand configured Change hybrid or OAuth authentication between Change Server and your Change On-line group however now not use it, make certain to reset the service principal’s keyCredentials,” Microsoft stated.
The event comes because the Home windows maker stated it’ll start briefly blocking Change Net Providers (EWS) site visitors utilizing the Change On-line shared service principal beginning this month in an effort to extend the client adoption of the devoted Change hybrid app and enhance the safety posture of the hybrid setting.
Microsoft’s advisory for CVE-2025-53786 additionally coincides with CISA’s evaluation of assorted malicious artifacts deployed following the exploitation of not too long ago disclosed SharePoint flaws, collectively tracked as ToolShell.

This consists of two Base64-encoded DLL binaries and 4 Lively Server Web page Prolonged (ASPX) information which are designed to retrieve machine key settings inside an ASP.NET software’s configuration and act as an online shell to execute instructions and add information.
“Cyber risk actors might leverage this malware to steal cryptographic keys and execute a Base64-encoded PowerShell command to fingerprint the host system and exfiltrate knowledge,” the company stated.
CISA can also be urging entities to disconnect public-facing variations of Change Server or SharePoint Server which have reached their end-of-life (EOL) or end-of-service from the web, to not point out discontinue using outdated variations.

The Hacker News Tags:Access, Cloud, Discloses, Enabling, Exchange, Flaw, Hybrid, Microsoft, Server, Setups, Silent

Post navigation

Previous Post: 6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
Next Post: What 2025 Is Teaching Us About Cloud Defense

Related Posts

Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub The Hacker News
ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks The Hacker News
Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More The Hacker News
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms The Hacker News
Why Organizations Are Turning to RPAM The Hacker News
New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data
  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data
  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark