Home Microsoft CVE-2025-58107
Back to Microsoft

CVE-2025-58107

Microsoft Exchange 2019 - Exchange ActiveSync

Microsoft CVSS 7.5 Updated March 14, 2026

Executive Risk Summary

"A vulnerability in Microsoft Exchange through 2019 allows sensitive data from Samsung mobile devices to be transmitted in cleartext, including user credentials and tokens, when using Exchange ActiveSync configurations on on-premises servers. This poses a significant risk to the confidentiality and integrity of user data, as attackers could intercept and exploit this information."

Operational Audit Arsenal

Target Type Service
Target Asset Microsoft Exchange ActiveSync
Standard Path %ExchangeInstallPath%\ClientAccess\Sync
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Microsoft Exchange ActiveSync (Service)
$Targets = 'Microsoft Exchange ActiveSync'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Email services may be affected

Internal Work Notes

Investigate and apply patches to Microsoft Exchange servers to prevent cleartext transmission of sensitive user data via Exchange ActiveSync.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.