Loading HuntDB...

CVE-2025-53786

HIGH
Published 2025-08-06T16:02:05.764Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-53786. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
8.0
/10
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
Not Available
Attack Complexity
Not Available
Privileges Required
Not Available
User Interaction
Not Available
Scope
Not Available

Impact Metrics

Confidentiality
Not Available
Integrity
Not Available
Availability
Not Available

Description

No description available

Available Exploits

No exploits available for this CVE.

Related News

Nearly 30,000 Microsoft Exchange servers remain unpatched against critical hybrid flaw

A critical vulnerability in Microsoft Exchange Server remains unpatched on nearly 30,000 systems worldwide, raising concerns about potential exploitation in hybrid cloud environments. The vulnerability, tracked as CVE-2025-53786, affects Exchange 2016, Exchan…

SiliconANGLE News 2025-08-11 23:42
CISA orders fed agencies to patch new Exchange flaw by Monday

CISA has issued an emergency directive ordering all Federal Civilian Executive Branch (FCEB) agencies to mitigate a critical Microsoft Exchange hybrid vulnerability tracked as CVE-2025-53786 by Monday morning at 9:00 AM ET. [...]

BleepingComputer 2025-08-07 20:14
CVE-2025-53786: Frequently Asked Questions About Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability

Frequently asked questions about CVE-2025-53786, an elevation of privilege vulnerability affecting Microsoft Exchange Server Hybrid Deployments.BackgroundTenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questi…

Tenable.com 2025-08-07 20:06
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that could allow an attacker to gain elevated privileges under certain conditions. The vulnerability, tracked as CVE-2025-53786, carries a CV…

Biztoc.com 2025-08-07 19:59
Microsoft urges admins to plug severe Exchange security hole (CVE-2025-53786)

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable …

Help Net Security 2025-08-07 14:25

Affected Products

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.

Affected Products (ENISA)

microsoft
microsoft exchange server subscription edition rtm

ENISA Scoring

CVSS Score (3.1)

8.0
/10
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

EPSS Score

0.080
probability

Data provided by ENISA EU Vulnerability Database. Last updated: August 15, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-v92c-556h-xm93

Advisory Details

On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: August 6, 2025, Modified: August 6, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

25 posts
Reddit 3 days, 4 hours ago
Fun_Tomorrow_8536

Another Tenable L For those of you scrambling because you think your exchange servers are vulnerable to a 10.0 CVSS CVE (CVE-2025-53786), don't worry. Tenable is wrong and completely ignored the actual advisory versions. Over a week later and problem still there.

Reddit 6 days, 6 hours ago
Sarunas

Kritinis pažeidžiamumas „Microsoft Exchange Server“ „Microsoft“ paskelbė aukštos rizikos saugumo spragą Exchange Server lokalioms versijoms (CVE-2025-53786) su CVSS balu 8.0. Ši klaida gali leisti atakantiesiems įgyti padidintas privilegijas hibridiniuose diegimuose. Kreipiam dėmesį į Dirk-jan Mollema iš Outsider Security už nustatymą. Skaitom: [https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html](https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html)

Reddit 1 week ago
Steve_Dobbs_69

CVE-2025-53786: Microsoft Exchange Server Security Vulnerability in Hybrid Deployments

Reddit 1 week ago
k12techpro
Exploit PoC

Security Watch 8/15/25 On K12TechPro, we've launched a weekly cyber threat intelligence and vulnerability newsletter with NTP and K12TechPro. We'll post the "public" news to k12sysadmin from each newsletter. For the full "k12 techs only" portion (no middle schoolers, bad guys, vendors, etc. allowed), log into [k12techpro.com](http://k12techpro.com) and visit the …

Also mentions: CVE-2025-8088
3
3.0
View Original High Risk
Reddit 1 week, 2 days ago
technadu

🚨 Microsoft August Patch Tuesday — 107 flaws, 13 critical Microsoft patched **107 vulnerabilities** this month — **13 are critical**. 💥 Notable issues: * Exchange CVE-2025-53786 — risk of lateral movement to cloud platforms. * SharePoint CVE-2025-49712 — potential chaining with bypasses for full compromise. * Kerberos flaws with credential …

Reddit 1 week, 3 days ago
orddie1

Check me on CVE-2025-53786 If we never installed or configured hybrid, are we vulnerable?

Reddit 1 week, 3 days ago
technadu

CISA Emergency Directive: CVE-2025-53786 in Microsoft Hybrid Exchange – Potential Total Domain Compromise CISA has issued ED 25-02 for a **high-severity privilege escalation flaw** in Microsoft Exchange hybrid deployments. Attackers with **on-prem admin access** could escalate into **Exchange Online** by exploiting shared service principal configs — evading detection. 🔹 **Mitigation …

Reddit 1 week, 3 days ago
technadu

Cybersecurity Roundup, Top Cybersecurity News updates!! * **Manpower** confirms breach affecting 144K+ individuals, tied to RansomHub claims. * **CISA** adds 3 exploited vulnerabilities to KEV: Internet Explorer, Microsoft Excel, WinRAR. * **Wikipedia** loses legal challenge to UK Online Safety Act — age checks still uncertain. * **Exchange hybrid flaw (CVE-2025-53786)** …

Reddit 1 week, 3 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (13/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2024-53141](https://nvd.nist.gov/vuln/detail/CVE-2024-53141)** - 📝 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values …

2
2.0
View Original High Risk
Reddit 1 week, 4 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (12/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-32724](https://nvd.nist.gov/vuln/detail/CVE-2025-32724)** - 📝 Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability - 📅 **Published:** 10/06/2025 - 📈 **CVSS:** 7.5 - 🧭 **Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C - 📣 **Mentions:** 4 - ⚠️ …

1
1.0
View Original High Risk

References

Published: 2025-08-06T16:02:05.764Z
Last Modified: 2025-08-13T15:42:55.252Z
Copied to clipboard!