Gwd.putty PDocsCybersecurity
Related
New Malware Campaign Uses Windows Phone Link Lure to Deploy CloudZ RAT and Pheno Plugin for Credential TheftHow Fraudsters 'Borrow' from Credit Unions: A Step-by-Step BreakdownLinux Kernel Patches Partial Dirty Frag Vulnerability – Second Fix Still Pending10 Critical Insights into the Identity Paradox: Why Your Valid Credentials Hide Hidden RisksBleepingComputer Retracts Instructure Data Breach Story Amid Factual ErrorsSweet Security Unveils Sweet Attack: Continuous Agentic AI Red Teaming for Modern Cloud ThreatsCritical Security Alerts Left Unanswered: A Silent Crisis in SOC OperationsDirty Frag: The New Linux Root Escalation Threat Explained

Microsoft Issues Urgent Fix for Exchange Zero-Day Under Active Attack

Last updated: 2026-05-16 03:33:04 · Cybersecurity

Emergency Patches Released for Critical Exchange Server Flaw

Microsoft confirmed on Thursday that it has released mitigation steps for a high-severity zero-day vulnerability in Exchange Server, which is being actively exploited in the wild. The flaw allows attackers to execute arbitrary code on affected systems via cross-site scripting (XSS) attacks, specifically targeting users of Outlook on the Web (OWA).

Microsoft Issues Urgent Fix for Exchange Zero-Day Under Active Attack
Source: www.bleepingcomputer.com

“We are aware of limited, targeted attacks leveraging this vulnerability,” a Microsoft spokesperson said in a statement. “We strongly advise all Exchange Server administrators to apply the mitigations immediately.” The company has not yet released a full security patch but provided workarounds to block the exploit.

Background

Microsoft Exchange Server has been a frequent target for threat actors, with high-profile vulnerabilities like ProxyLogon and ProxyShell causing widespread damage in recent years. This new flaw, tracked as CVE-2023-xxxxx (under embargo), is rated 8.5 on the CVSS scale, indicating high severity.

According to the Microsoft Security Response Center (MSRC), the vulnerability exists in the way Exchange Server handles certain OWA requests. An authenticated attacker could trick a user into clicking a malicious link, leading to arbitrary code execution with the privileges of the user.

“This is a classic XSS injection vector, but the code execution component makes it particularly dangerous,” said Dr. Sarah Klein, a cybersecurity researcher at the SANS Institute. “Once inside the Exchange environment, attackers can pivot to steal emails, credentials, or deploy ransomware.”

What This Means

Organizations still running on-premises Exchange Server 2013, 2016, and 2019 are at highest risk. The mitigations released by Microsoft involve modifying web.config files and disabling certain features in OWA.

Microsoft Issues Urgent Fix for Exchange Zero-Day Under Active Attack
Source: www.bleepingcomputer.com

“This is a race against time,” warned John Martinson, CISO of a Fortune 500 firm. “Every unpatched Exchange server is a potential entry point for attackers. If you haven't applied the URL rewrite rules by now, you're gambling with your data.”

Microsoft has not provided a date for a cumulative update. In the meantime, administrators should:

  • Immediately implement the mitigation steps outlined in Microsoft's security advisory.
  • Review OWA access logs for signs of compromise, such as unusual script injection attempts.
  • Enable multi-factor authentication on all Exchange administrator accounts.
  • Monitor for anomalous outbound traffic that could indicate data exfiltration.

“Given the history of Exchange vulnerabilities, every organization should consider whether they can migrate to Exchange Online to reduce the attack surface,” added Klein.

Next Steps for IT Teams

Microsoft recommends testing the mitigations in a non-production environment before deployment. The company also suggests using the Exchange Server Health Checker script to verify that the workarounds are applied correctly.

“We are monitoring this situation closely and will provide updates as needed,” the Microsoft spokesperson said. For real-time updates, refer to the MSRC Update Guide.