Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-59249— Microsoft Exchange Server Elevation of Privilege Vulnerability

CVSS 8.8 · High EPSS 0.11% · P30
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-59249

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Exchange Server Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1390
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Exchange Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server存在安全漏洞,该漏洞源于攻击者利用该漏洞可以提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft Exchange Server 2016 Cumulative Update 23 15.01.0.0 ~ 15.01.2507.061 -
MicrosoftMicrosoft Exchange Server 2019 Cumulative Update 14 15.02.0.0 ~ 15.02.1544.036 -
MicrosoftMicrosoft Exchange Server 2019 Cumulative Update 15 15.02.0.0 ~ 15.02.1748.039 -
MicrosoftMicrosoft Exchange Server Subscription Edition RTM 15.02.0.0 ~ 15.02.2562.029 -

II. Public POCs for CVE-2025-59249

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-59249

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2025-10-14 · 167 CVEs total

CVE-2025-553159.9 CRITICALASP.NET Security Feature Bypass Vulnerability
CVE-2025-497089.9 CRITICALMicrosoft Graphics Component Elevation of Privilege Vulnerability
CVE-2025-592879.8 CRITICALWindows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2025-592958.8 HIGHWindows URL Parsing Remote Code Execution Vulnerability
CVE-2025-587188.8 HIGHRemote Desktop Client Remote Code Execution Vulnerability
CVE-2025-592288.8 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2025-587158.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-587168.8 HIGHWindows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-592378.8 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2025-592138.8 HIGHConfiguration Manager Elevation of Privilege Vulnerability
CVE-2025-537828.4 HIGHMicrosoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-592368.4 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2025-592928.2 HIGHAzure Compute Gallery Elevation of Privilege Vulnerability
CVE-2025-592918.2 HIGHConfidential Azure Container Instances Elevation of Privilege Vulnerability
CVE-2025-592508.1 HIGHJDBC Driver for SQL Server Spoofing Vulnerability
CVE-2025-592337.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2025-592907.8 HIGHWindows Bluetooth Service Elevation of Privilege Vulnerability
CVE-2025-592317.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2025-592077.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2025-556927.8 HIGHWindows Error Reporting Service Elevation of Privilege Vulnerability

Showing top 20 of 167 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-59249

No comments yet


Leave a comment