CISA has issued an emergency directive regarding the recently disclosed and somewhat weird vulnerability in Microsoft Exchange hybrid deployments (CVE-2025-53786), ordering all civilian federal agencies to address the flaw by Aug. 11.

The bug is related to a hot fix that Microsoft released on April 18, which was intended to improve the security of hybrid Exchange deployments, but wasn’t a patch for a specific vulnerability. Since then, Microsoft has identified a vulnerability that’s related to the guidance in that release and recently issued a CVE for it. 

The flaw is serious, but it’s only exploitable post-authentication, which is a significant mitigating factor. 

“In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace. This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations,” Microsoft’s advisory says.

Although exploitation requires authentication and there have not been any reports of attacks targeting this flaw, the vulnerability has garnered quite a bit of attention this week in the security community, thanks to the potential damage from exploitation. 

“This vulnerability poses grave risk to all organizations operating Microsoft Exchange hybrid-joined configurations that have not yet followed the April 2025 patch guidance and immediate mitigation is critical. Although exploitation of this vulnerability is only possible after an attacker establishes administrative access on the on-premises Exchange server, CISA is deeply concerned at the ease with which a threat actor could escalate privileges and gain significant control of a victim’s M365 Exchange Online environment,” CISA’s directive says.

The directive requires all of the affected agencies to assess their current Exchange environments and, if necessary, run the latest Microsoft update and disconnect end-of-life servers. Emergency directives from CISA are relatively rare and the agency usually issues them when there is active, widespread exploitation of a flaw in a popular product, such as Ivanti Connect Secure. Log4J might ring a bell, too.

Although there isn’t any known public exploitation of CVE-2025-53786 yet, with the CISA directive and Microsoft advisory, there’s no time like the present to check your organization’s Exchange deployment. 

Note: Cisco and Duo are no longer affiliated with Decipher.  All opinions and content provided here from April 11 are solely that of Decipher and do not reflect opinions or content of Cisco Systems, Inc. or any of its affiliates.