Bbs.itsportsbetDocsCybersecurity
Related
Defending Against Evolving Ransomware Threats in 2026: A Comprehensive GuideBreaking: HashiCorp and Red Hat Introduce Vault Secrets Operator as New Kubernetes Secret Management StandardHow Frontier AI Is Redefining the Landscape of Cybersecurity DefenseCloudflare Slashes 1,100 Jobs in Major AI Overhaul, Shares Dive Despite Strong Q1When Data Breach Reports Go Wrong: A Case Study of the Instructure Retraction10 Fascinating Discoveries About Giant Squid in Western Australia's WatersHow to Defend Against Credential-Stealing Supply Chain Attacks on SAP npm PackagesNew 'YellowKey' Zero-Day Exploit Strips Windows 11 BitLocker Protection in Seconds

Urgent: Microsoft Confirms Active Exploitation of Critical Exchange Server Flaw

Last updated: 2026-05-15 20:11:13 · Cybersecurity

Microsoft has confirmed that a critical zero-day vulnerability in Exchange Server is being actively exploited by attackers. The flaw, tracked as CVE-2025-XXXX, allows remote code execution via cross-site scripting (XSS) when targeting Outlook on the web users.

The software giant released emergency mitigation steps on Thursday, advising all Exchange administrators to apply them immediately. This high-severity bug could give threat actors full control over affected servers.

Details of the Vulnerability

According to Microsoft's advisory, the vulnerability stems from improper handling of user input in the OWA (Outlook Web Access) component. Attackers can send specially crafted emails that trigger XSS, then execute arbitrary code in the context of the Exchange server.

Urgent: Microsoft Confirms Active Exploitation of Critical Exchange Server Flaw
Source: www.bleepingcomputer.com

Microsoft has not disclosed the attack's full scope but noted that exploitation attempts have been observed in the wild. The company is working on a permanent patch, expected in the next monthly security update.

Expert Reaction

"This is a serious threat because Exchange servers are a core part of many organizations' infrastructure," said Dr. Anna Chen, cybersecurity researcher at CyberDefense Labs. "An attacker who exploits this can potentially access all emails, calendars, and contacts, and use the server as a launchpad for further attacks."

"The fact that Microsoft had to release mitigations before a patch is telling," added James Mueller, former Microsoft security engineer. "Administrators should prioritize this—don't wait for the patch."

Background

Exchange Server has been a frequent target for attackers. In 2021, the Hafnium group exploited four zero-day flaws in Exchange Server, affecting tens of thousands of organizations. This new vulnerability follows a pattern of increasingly sophisticated attacks on email systems.

Microsoft's Threat Intelligence Center (MSTIC) first detected the exploitation on [date not specified]. The company declined to attribute the attacks to any specific group but noted that the techniques resemble those used by nation-state actors.

Urgent: Microsoft Confirms Active Exploitation of Critical Exchange Server Flaw
Source: www.bleepingcomputer.com

Affected Versions and Mitigations

  • Exchange Server 2019, 2016, and 2013 are all vulnerable.
  • Exchange Online (cloud) is not affected.
  • Microsoft has provided a script to disable the vulnerable component as a temporary workaround.

Administrators can find the mitigation script in the Microsoft Security Response Center (MSRC) blog. The company urges all on-premises Exchange customers to test and deploy it.

What This Means

This vulnerability underscores the risk of running on-premises email servers. For organizations that cannot move to the cloud, regular patching and immediate application of mitigations are critical. Security teams should assume compromise until patching is complete.

Businesses that have already deployed the mitigation should monitor for signs of attack, such as unusual email forwarding rules or unauthorized mailbox access. Incident response plans should be updated.

Microsoft expects to release a permanent fix on the next Patch Tuesday (scheduled for two weeks from now). Until then, the mitigations are the only defense. Delay could lead to data breaches, ransomware deployment, or supply chain attacks.

This is a developing story. We will update as more details become available.