Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Exploit Targets On-Prem Microsoft Exchange Servers

New Exploit Targets On-Prem Microsoft Exchange Servers

Posted on May 15, 2026 By CWS

Microsoft has recently revealed a critical security vulnerability affecting on-premise Exchange Server versions. This flaw, identified as CVE-2026-42897 with a CVSS score of 8.1, has been actively exploited, posing significant risks to users. The vulnerability stems from a cross-site scripting issue, allowing unauthorized attackers to perform spoofing attacks over networks.

Details of the Vulnerability

The security flaw was discovered by an anonymous researcher and has been characterized as a spoofing bug. Improper neutralization of input during the generation of web pages in Microsoft Exchange Server enables attackers to execute arbitrary JavaScript code. This occurs when a crafted email is opened in Outlook Web Access under specific conditions.

Microsoft has tagged this vulnerability with an ‘Exploitation Detected’ label, signifying active attempts to exploit the flaw. The company advises users to be vigilant and to apply recommended mitigations promptly.

Mitigation Measures and Impact

In response, Microsoft has introduced a temporary solution via its Exchange Emergency Mitigation Service. This service automatically implements a URL rewrite configuration to mitigate the issue and is enabled by default. Users are encouraged to ensure this Windows service is active to protect their systems.

For those unable to use the mitigation service due to air-gap restrictions, Microsoft has provided alternative actions. These include downloading the latest Exchange on-premises Mitigation Tool and applying it either per server or across all servers using specific PowerShell commands.

Current Status and Recommendations

Exchange Online remains unaffected by this vulnerability, while the impacted versions include Exchange Server 2016, 2019, and the Subscription Edition. Microsoft has acknowledged a cosmetic issue where the mitigation status may appear incorrect, but assures users that the mitigation applies successfully.

As of now, details regarding the exploitation methods, the threat actors involved, or the extent of the attacks are unavailable. Consequently, Microsoft urges users to adopt the suggested mitigations to safeguard their systems.

While the company works on a permanent fix, staying informed and proactive is crucial for users of affected Exchange Server versions to maintain security and integrity.

The Hacker News Tags:CVE-2026-42897, Cybersecurity, Exchange Server, IT security, Microsoft, Mitigation, Security, Spoofing, Technology, Vulnerability

Post navigation

Previous Post: Critical Cisco Vulnerability Added to CISA’s Exploited List
Next Post: Cisco Addresses Sixth SD-WAN Zero-Day Exploit of 2026

Related Posts

Critical Security Flaws in Hikvision and Rockwell Products Critical Security Flaws in Hikvision and Rockwell Products The Hacker News
How Continuous Exposure Management Transforms Security Operations How Continuous Exposure Management Transforms Security Operations The Hacker News
Critical RCE Bug Rated 9.9 CVSS in Backup & Replication Critical RCE Bug Rated 9.9 CVSS in Backup & Replication The Hacker News
Speagle Malware Exploits Security Software for Data Theft Speagle Malware Exploits Security Software for Data Theft The Hacker News
How Attackers Exploit Trusted Tools in Cybersecurity How Attackers Exploit Trusted Tools in Cybersecurity The Hacker News
Critical PAN-OS Flaw Exploited for Root Access Critical PAN-OS Flaw Exploited for Root Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco Addresses Sixth SD-WAN Zero-Day Exploit of 2026
  • New Exploit Targets On-Prem Microsoft Exchange Servers
  • Critical Cisco Vulnerability Added to CISA’s Exploited List
  • Hackers Launch $1,000 Contest for Open-Source Attacks
  • Critical Flaw in Canon MailSuite Risks RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco Addresses Sixth SD-WAN Zero-Day Exploit of 2026
  • New Exploit Targets On-Prem Microsoft Exchange Servers
  • Critical Cisco Vulnerability Added to CISA’s Exploited List
  • Hackers Launch $1,000 Contest for Open-Source Attacks
  • Critical Flaw in Canon MailSuite Risks RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark