Critical Zero Day Vulnerability in Microsoft Exchange Actively Exploited

Cybersecurity researchers have issued an urgent alert regarding a newly discovered zero day vulnerability in Microsoft Exchange Server that is already being exploited in targeted attacks. First identified by threat analysts at Trend Micro and confirmed by Microsoft's security response team, the flaw enables remote code execution through crafted email requests, giving attackers full control over affected systems without user interaction.

The vulnerability affects Exchange Server 2016, 2019, and hybrid environments, particularly those that have not applied the latest cumulative updates. Microsoft has not yet released a full patch but has published interim mitigation steps, including blocking specific PowerShell functions and deploying network filters to prevent known exploit patterns.

According to researchers, the flaw is being weaponized by at least two advanced persistent threat (APT) groups believed to be based in Eastern Europe. Victims have included law firms, small financial companies, and regional government systems in North America and Western Europe.

What makes this vulnerability especially dangerous is its stealth. Exploits leave minimal traces in standard logs, making detection difficult. Once compromised, attackers have been observed deploying backdoors, exfiltrating data, and establishing persistent remote access.

What Should You Do?

  • Apply all available Exchange updates and follow Microsoft's latest mitigation guidance
  • Monitor for unusual PowerShell activity and outbound traffic
  • Use endpoint detection and response (EDR) tools to identify lateral movement

This incident underscores the critical need for proactive patching and layered security. Small and midsize organizations are especially vulnerable if they manage Exchange servers in house without dedicated IT staff. Microsoft is expected to issue a full security fix within the coming days.

Sources