Microsoft Exchange Hybrid Flaw Could Lead to Total Domain Compromise

Share:

On August 6, 2025, Microsoft publicly disclosed a high-severity vulnerability impacting Microsoft Exchange Server in hybrid deployments. It affects environments where on-premises Exchange Servers are integrated with Exchange Online. If exploited, this could lead to total domain compromise across hybrid and cloud infrastructure.

Severity Level: High

Vulnerability Details

  • CVE ID: CVE-2025-53786
  • CVSS Score: 8.0
  • Impact: Elevation of Privilege
  • Exploitability: Requires admin access to on-prem Exchange server
  • Weakness Class: CWE-287 – Improper Authentication
  • Description: The vulnerability is associated with mismanagement of service principal credentials, which are shared between on-prem Exchange and Exchange Online in hybrid deployments. Once compromised, a malicious actor can generate valid tokens to act on behalf of cloud services without being logged or flagged in Microsoft 365 auditing. Microsoft addressed this vulnerability in the April 2025 Exchange Server Hotfix Updates. These updates introduce configuration changes and harden the use of service principals.
  • Affected Products:
    • Microsoft Exchange Server 2016 CU23
    • Microsoft Exchange Server 2019 CU14
    • Microsoft Exchange Server 2019 CU15
    • Microsoft Exchange Server SE (RTM)

Exploitation

To exploit this vulnerability, a threat actor must:

  • Gain administrative access to an on-prem Exchange server.
  • Manipulate the shared service principal used in the hybrid configuration.
  • Forge access tokens or impersonate Exchange Online components, thereby escalating privileges and gaining stealth access to cloud-hosted mailboxes or services.
  • Since the tokens are accepted as valid, no audit logs are typically generated in Microsoft 365, making detection very difficult.

Microsoft and CISA warn that failure to mitigate the issue could lead to a total domain compromise across both cloud and on-premises environments.

Recommendations

  1. If using Exchange hybrid, review Microsoft’s guidance Exchange Server Security Changes for Hybrid Deployments to determine if your Microsoft hybrid deployments are potentially affected and available for a Cumulative Update (CU).
  2. Install Microsoft’s April 2025 Exchange Server Hotfix Updates on the on-premise Exchange server and follow Microsoft’s configuration instructions Deploy dedicated Exchange hybrid app.
  3. For organizations using Exchange hybrid (or have previously configured Exchange hybrid but no longer use it), review Microsoft’s Service Principal Clean-Up Mode for guidance on resetting the service principal’s keyCredentials.
  4. Upon completion, run the Microsoft Exchange Health Checker to determine if further steps are required.
  5. Disconnect public-facing versions of Exchange Server or SharePoint Server that have reached their end-of-life (EOL) or end-of-service from the internet.

Source:

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786
  • https://www.cisa.gov/news-events/alerts/2025/08/06/microsoft-releases-guidance-high-severity-vulnerability-cve-2025-53786-hybrid-exchange-deployments

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.