Thursday, April 10, 2025
HomeComputer SecurityMicrosoft Exchange Server Zero-day Flaw Exploit Provide Highest Admin Privilege to Hackers

Microsoft Exchange Server Zero-day Flaw Exploit Provide Highest Admin Privilege to Hackers

Published on

SIEM as a Service

Follow Us on Google News

A New privilege escalation zero-day vulnerability discovered in Microsoft Exchange server that allows an attacker to gain admin privilege through a set of 3 critical attack vector.

Active Directory and Exchange used by most of organizations and the Exchange server admin can able to escalate and control domain admin access.

There are 3 combination of attack would be possible by this zero-day flaw in Microsoft Exchange.

- Advertisement - Google News
  • Exchange Servers have (too) high privileges by default
  • NTLM authentication is vulnerable to relay attacks
  • Exchange has a feature which makes it authenticate to an attacker with the computer account of the Exchange server

Default Highest Privilege on Exchange server

A First and Important vulnerability that took in Active Directory domain which has highest privilege in Exchange  .

“The Exchange Windows Permissions group has WriteDacl access on the Domain object in Active Directory, which enables any member of this group to modify the domain privileges “

By having this privilege by an attacker can able to synchronize all the hashed passwords of users in the Active Directory. 

NTLM Relaying Attack

NTLM Relaying attack can be performed when authentication is relayed to LDAP, objects in the directory can be modified to grant an attacker privilege.

LDAP, which can be used to read and modify objects in the (Active) directory.

In this case, ACL attack can be performed if Attacker can have an Exchange server to authenticate with NTLM authentication.

According to Researcher, “it is possible to pass authentication that is performed (automatically) by Windows when it connects to the attacker’s machine on to other machines in the network”

In order to authenticate with Exchange ZDI researcher discovered that it is possible to get Exchange to authenticate to an arbitrary URL over HTTP via the Exchange PushSubscription feature.

Escalate the Privilege via This Zero-day Flaw

A researcher using two ( privexchange.py and ntlmrelayx )different tools in order to perform this attack. You can get both on GitHub in PrivExchange and impacket repositories.

The first Step this attack targets the domain controller and supply a user under the attacker’s control to escalate the privilege using ntlmrelayx in relay mode. Read the technical details here.

This attack was performed by Compromised Credentials but still this attack is possible possible to trigger Exchange to authenticate. If we perform a SMB to HTTP (or HTTP to HTTP) relay attack If an attacker is only in a position to perform a network attack.

proof-of-concept tool also released for this attack which dubbed by researcher as “PrivExchange”. and the still no patch is available for this Zero-day vulnerability.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Microsoft has urgently patched a high-risk security vulnerability (CVE-2025-29810) in Windows Active Directory Domain...

Adobe Security Update: Patches Released for Multiple Product Vulnerabilities

Adobe has announced critical security updates for several of its popular software products, addressing...