CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 15, 2026

Critical Microsoft Exchange Server Vulnerability Actively Exploited in Attacks

Cybersecurity News Archived May 15, 2026 ✓ Full text saved

Microsoft issued an urgent security alert regarding a newly discovered vulnerability in Exchange Server that is currently being exploited in the wild. Tracked as CVE-2026-42897, this critical spoofing flaw carries a high CVSS 3.1 severity score of 8.1 and directly impacts on-premises email infrastructure. Threat actors are actively exploiting this network-based weakness to compromise organizational […] The post Critical Microsoft Exchange Server Vulnerability Actively Exploited in Attacks appear

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Critical Microsoft Exchange Server Vulnerability Actively Exploited in Attacks By Abinaya May 15, 2026 Microsoft issued an urgent security alert regarding a newly discovered vulnerability in Exchange Server that is currently being exploited in the wild. Tracked as CVE-2026-42897, this critical spoofing flaw carries a high CVSS 3.1 severity score of 8.1 and directly impacts on-premises email infrastructure. Threat actors are actively exploiting this network-based weakness to compromise organizational systems before a permanent patch is finalized. Cybersecurity analysts have confirmed that the vulnerability specifically targets the Microsoft Exchange Outlook Web Access service. Because the flaw is already being utilized in active campaigns, system administrators are urged to apply temporary defensive measures immediately. The security risk is entirely focused on on-premises deployments, meaning organizations using cloud-based Microsoft Exchange Online remain completely unaffected by this threat vector. Microsoft Exchange Server Flaw Exploited The technical foundation of this cyberattack relies on improper input neutralization during web page generation, which is commonly classified as a cross-site scripting weakness. An unauthorized attacker can exploit this issue by sending a specially crafted email directly to a targeted user. If the recipient opens the malicious message in Outlook Web Access and meets certain interaction conditions, the payload allows arbitrary JavaScript to execute seamlessly in the user’s browser. Security researchers note that this execution path effectively enables network-level spoofing without requiring prior administrative privileges. The vulnerability impacts several major iterations of the platform, specifically affecting Exchange Server 2016, Exchange Server 2019, and the Exchange Server Subscription Edition across all update levels. The low attack complexity combined with a network-based execution model makes this a highly effective tool for threat actors attempting to hijack user sessions or manipulate local browser data. warning displayed in mitigation details(source : .microsoft) While a permanent security update is currently undergoing development and testing, Microsoft has deployed a temporary safeguard through the automated Exchange Emergency Mitigation Service. For organizations with this default service enabled, the specific mitigation identified as M2.1.x is automatically applied to protect vulnerable environments. Administrators operating in disconnected or air-gapped networks must manually download and execute the latest Exchange on-premises Mitigation Tool script via an elevated management shell to achieve this necessary protection. Implementing this emergency mitigation introduces minor operational side effects that IT teams must manage. Microsoft documentation indicates that the Outlook Web Access Print Calendar functionality may stop working properly, requiring users to rely on the desktop client or take manual screenshots. Furthermore, inline images might not display correctly within the reading pane, prompting workarounds such as sending images as direct attachments. Despite these cosmetic and functional disruptions, the security community strongly advises organizations to keep the mitigation active. Microsoft software engineers are actively finalizing a permanent official fix that meets their quality assurance standards. Once released, the security update will be made publicly available for the Exchange Server Subscription Edition. However, permanent updates for older versions, such as Exchange 2016 and 2019, will be provided only to customers who are actively enrolled in the Period 2 Exchange Server Extended Security Update program. Organizations relying on older cumulative updates are strongly encouraged to upgrade their infrastructure immediately to ensure compatibility with the final patch when it is deployed. Follow us on Google News, LinkedIn, and X to Get More Instant Updates. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Abinayahttps://cybersecuritynews.com/ Abi is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space. Trending News Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks Claude’s Chrome Extension Vulnerability Allows Malicious Extensions to Steal Gmail and Drive Data Google Warns of Hackers Using AI to Create Working Zero-Day Exploit Latest News Cyber Security News OpenAI Confirms Security Breach Via TanStack npm Supply Chain Attack Cyber Security Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain Admin Access Cyber Security News Sandworm Hackers Pivot From Compromised IT Systems Toward Critical OT Assets Cyber Security News Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network Cyber Security News New Malware Framework Enables Screen Control, Browser Artifact Access, and UAC Bypass
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗