A critical Exchange hybrid vulnerability could let attackers gain cloud admin access.
Key Takeaways:
Microsoft has issued an advisory warning customers of a critical security flaw in Exchange Server hybrid deployments. The vulnerability could allow attackers to escalate privileges within cloud environments, without triggering any alerts or leaving behind detectable traces.
An Exchange hybrid configuration is a setup that connects an on-premises Microsoft Exchange Server with Exchange Online in Microsoft 365, which allows organizations to manage mailboxes across both environments. It enables seamless communication, unified address lists, calendar sharing, and secure mail routing between on-premises and cloud users. This approach is ideal for businesses transitioning to the cloud gradually or needing to keep certain data on-premises due to compliance or operational requirements.
This security vulnerability, tracked as CVE-2025-53786, was disclosed by Microsoft on August 6, 2025. It stems from the shared service principal used for authentication between on-premises Exchange and Exchange Online. An attacker who gains admin access to the on-premises server could exploit this trust to forge tokens or API calls accepted by the cloud environment. This vulnerability affects Exchange Server 2016/2019 and the Exchange Server Subscription Edition.
“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace. This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations,” Microsoft explained.
To protect organizations against the Exchange hybrid vulnerability, Microsoft recommends that administrators apply the April 2025 Exchange Server Hotfix updates on the on-premises Exchange Server. It’s also recommended to use the Exchange Hybrid Configuration Wizard (HCW) to ensure that the hybrid setup follows Microsoft’s latest guidance, especially regarding authentication and service principal configurations.
Additionally, administrators must run the service principal credential clean-up script to reset and secure the shared credentials used between on-premises Exchange and Exchange Online. The Exchange Health Checker tool also helps to identify misconfigurations, outdated components, and potential security risks.
Last but not least, it’s highly recommended to disconnect End-of-Life (EOL) Exchange Servers from the Internet within the organization. IT admins must also use Microsoft Defender and other security tools to detect suspicious behavior.