The vulnerabilities include two Exchange Server flaws (CVE-2025-25007 and CVE-2025-25005) enabling spoofing and tampering attacks, plus a Windows Graphics Component elevation of privilege vulnerability (CVE-2025-49743) that could facilitate privilege escalation attacks.
Key Takeaways
1. CVE-2025-25007/25005 enables network spoofing and tampering attacks.
2. CVE-2025-49743 allows SYSTEM access via race conditions.
3. Microsoft updates released August 12, 2025 - deploy urgently.
CVE-2025-25007 represents a spoofing vulnerability in Microsoft Exchange Server caused by improper validation of the syntactic correctness of input, classified under CWE-1286.
This network-based vulnerability requires no privileges or user interaction, earning a CVSS score of 5.3 with the attack vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C.
Successful exploitation allows attackers to spoof incorrect 5322.From email addresses displayed to users, compromising email authenticity.
The second Exchange vulnerability, CVE-2025-25005, enables tampering attacks through improper input validation (CWE-20).
With a higher CVSS score of 6.5 and vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C, this vulnerability requires low-level privileges but delivers high confidentiality impact.
Both Exchange vulnerabilities affect multiple versions, including Exchange Server 2016 CU23, Exchange Server 2019 CU14/CU15, and Exchange Server Subscription Edition RTM.
CVE-2025-49743 affects the Windows Graphics Component and represents a more complex attack vector involving concurrent execution using shared resources with improper synchronization.
This vulnerability combines two critical weaknesses: CWE-362 (Race Condition) and CWE-416 (Use After Free), creating a dangerous privilege escalation opportunity with a CVSS score of 6.7 and a vector string of CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C.
The vulnerability requires winning a race condition, making the attack complexity “High” but potentially granting SYSTEM privileges upon successful exploitation.
Microsoft’s exploitability assessment rates this as “Exploitation More Likely” compared to the Exchange vulnerabilities, indicating higher risk despite the complex exploitation requirements.
| CVE | Title | CVSS 3.1 Score | Severity |
| CVE-2025-25007 | Microsoft Exchange Server Spoofing Vulnerability | 5.3 | Important |
| CVE-2025-25005 | Microsoft Exchange Server Tampering Vulnerability | 6.5 | Important |
| CVE-2025-49743 | Windows Graphics Component Elevation of Privilege Vulnerability | 6.7 | Important |
Microsoft released coordinated security updates addressing all three vulnerabilities across affected platforms.
Server updates include KB5063221, KB5063222, KB5063223, and KB5063224, while Windows systems receive updates ranging from legacy Windows Server 2008 to the latest Windows 11 Version 24H2 and Windows Server 2025.
The Windows Graphics vulnerability affects an extensive range of systems, including Windows 10 versions 1607-22H2, Windows 11 versions 22H2- 24H2, and Windows Server versions 2008-2025.
Organizations should prioritize immediate patch deployment given the combination of network-based Exchange attacks and local privilege escalation capabilities that could enable sophisticated multi-stage attacks against enterprise infrastructure.
Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.
The post Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network appeared first on Cyber Security News.
A sign explaining restrictions on buying soda and sweetened drinks using Supplemental Nutrition Assistance Program…
The 98th Academy Awards, also known as The Oscars 2026, have finally arrived and are…
BIG COUNTRY, Texas (KTAB/KRBC) - A brand new Texas State Park is now open, and…
Aether OS puts a full-fledged desktop in your browser that ties directly into the AT…
A new weekend has arrived, and today, you can save big on Trails in the…
data-anim is a JavaScript animation library that applies CSS-powered animations to HTML elements while scrolling/hovering/clicking/loading…
This website uses cookies.