CVE-2025-53786
Microsoft Exchange Server Hybrid Deployment Authentication Bypass Vulnerability
Description
On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.
INFO
Published Date :
Aug. 6, 2025, 4:15 p.m.
Last Modified :
Aug. 6, 2025, 8:23 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
Affected Products
The following products are affected by CVE-2025-53786
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | HIGH | [email protected] |
Solution
- Install the April 2025 (or later) Hot Fix.
- Implement the security changes for hybrid deployments.
- Review Microsoft's security guidance for Exchange Server.
Public PoC/Exploit Available at Github
CVE-2025-53786 has a 5 public
PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-53786
.
URL | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786 |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-53786
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-53786
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
This repository contains a curated set of PowerShell scripts for Exchange environments, Microsoft 365, Azure, Intune and many more to come. Stay tuned!
automation cyber-security devops exchange exchange-online microsoft-365-desired-state-configuration
PowerShell
None
None
None
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-53786
vulnerability anywhere in the article.

-
BleepingComputer
Canada’s House of Commons investigating data breach after cyberattack
The House of Commons of Canada is currently investigating a data breach after a threat actor reportedly stole employee information in a cyberattack on Friday. While the lower house of the Parliament o ... Read more

-
BleepingComputer
CISA warns of N-able N-central flaws exploited in zero-day attacks
CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able's N-central remote monitoring and management (RMM) platform. N-central is commonly used by manag ... Read more

-
The Cyber Express
Microsoft Teams CVE-2025-53783 Vulnerability Could Allow Remote Code Execution
Microsoft has disclosed a serious vulnerability in its collaboration platform, Microsoft Teams, that could open the door to Remote Code Execution (RCE) attacks. The flaw, tracked as CVE-2025-53783, ca ... Read more

-
Help Net Security
Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
For August 2025 Patch Tuesday, Microsoft has released security updates resolving 100+ security vulnerabilities in its various solutions, including a relative path traversal flaw in Windows Kerberos (C ... Read more

-
The Hacker News
Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been disclosed as publicly known at the time of the release. Of ... Read more

-
krebsonsecurity.com
Microsoft Patch Tuesday, August 2025 Edition
Microsoft today released updates to fix more than 100 security flaws in its Windows operating systems and other software. At least 13 of the bugs received Microsoft’s most-dire “critical” rating, mean ... Read more

-
The Cyber Express
Patch Tuesday August 2025: 9 High-Risk Vulnerabilities Fixed by Microsoft
Microsoft’s Patch Tuesday update for August 2025 includes fixes for 110 Microsoft vulnerabilities, including nine at higher risk for exploitation and an additional five vulnerabilities carrying 9+ sev ... Read more

-
BleepingComputer
Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws
Today is Microsoft's August 2025 Patch Tuesday, which includes security updates for 107 flaws, including one publicly disclosed zero-day vulnerability in Windows Kerberos.This Patch Tuesday also fixes ... Read more

-
CybersecurityNews
Microsoft Patch Tuesday August 2025 Released – 107 Vulnerabilities Fixed Including 36 RCE
Microsoft released its August Patch Tuesday security updates, addressing a total of 107 vulnerabilities across its product ecosystem. The update includes fixes for 90 vulnerabilities, classified as fo ... Read more

-
Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Over 29,000 Unpatched Microsoft Exchange Servers Leaving Networks at Risk
A vulnerability in Microsoft Exchange leaves over 29,000 servers vulnerable. Learn how this unpatched security hole could compromise entire networks and what CISA is urging organisations to do now. A ... Read more

-
BleepingComputer
Over 29,000 Exchange servers unpatched against high-severity flaw
Over 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complet ... Read more

-
Help Net Security
Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Black Hat USA 2025 Black Hat USA 2025 took place at the Mandalay Bay Convention Center in Las Vegas. E ... Read more

-
security.nl
'28.000 Microsoft Exchange-servers missen belangrijke noodpatch'
Meer dan 28.000 Microsoft Exchange-servers, waarvan bijna zeshonderd in Nederland, missen een belangrijke noodpatch die afgelopen woensdag werd uitgebracht. Dat laat The Shadowserver Foundation op bas ... Read more

-
TheCyberThrone
CVE-2025-53652 impacts Jenkins Git
August 9, 2025OverviewCVE-2025-53652 is a vulnerability discovered in the Jenkins Git Parameter Plugin, which is widely used to provide dynamic parameterized build options in Jenkins jobs.This flaw al ... Read more

-
CybersecurityNews
BitUnlocker – Multiple 0-days to Bypass BitLocker and Extract All Protected Data
Researchers have disclosed a series of critical zero-day vulnerabilities that completely bypass Windows BitLocker encryption, allowing attackers with physical access to extract all protected data from ... Read more

-
CybersecurityNews
28,000+ Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online
Over 28,000 unpatched Microsoft Exchange servers are exposed on the public internet and remain vulnerable to a critical security flaw designated CVE-2025-53786, according to new scanning data released ... Read more

-
security.nl
Amerikaanse overheid opgedragen Exchange-lek voor maandag te patchen
Het Amerikaanse cyberagentschap CISA heeft Amerikaanse overheidsinstanties opgedragen een nieuwe kwetsbaarheid in Exchange Server voor maandagochtend 9.00 uur te patchen. Volgens het CISA vormt het be ... Read more

-
Help Net Security
August 2025 Patch Tuesday forecast: Try, try, again
July turned into a surprisingly busy month. It started slowly with a fairly ‘calm’ Patch Tuesday as I forecasted in my last blog. Although there were 130 new CVEs addressed across all the Microsoft re ... Read more

-
CybersecurityNews
CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday
CISA has issued an emergency advisory directing all Federal Civilian Executive Branch agencies to mitigate a newly disclosed Microsoft Exchange urgently hybrid-joined vulnerability, tracked as CVE-202 ... Read more

-
BleepingComputer
CISA orders fed agencies to patch new Exchange flaw by Monday
CISA has issued an emergency directive ordering all Federal Civilian Executive Branch (FCEB) agencies to mitigate a critical Microsoft Exchange hybrid vulnerability tracked as CVE-2025-53786 by Monday ... Read more
The following table lists the changes that have been made to the
CVE-2025-53786
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by [email protected]
Aug. 06, 2025
Action Type Old Value New Value Added Description On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment. Added CVSS V3.1 AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Added CWE CWE-287 Added Reference https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786