5.3
CVE-2025-25007
- EPSS 0.22%
- Veröffentlicht 12.08.2025 17:09:53
- Zuletzt bearbeitet 03.09.2025 14:51:46
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Exchange Server SwEditionsubscription Version < 15.02.2562.020
Microsoft ≫ Exchange Server Version2016 Update-
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_1
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_10
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_11
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_12
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_13
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_14
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_15
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_16
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_17
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_18
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_19
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_2
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_20
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_21
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_22
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_3
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_4
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_5
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_6
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_7
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_8
Microsoft ≫ Exchange Server Version2016 Updatecumulative_update_9
Microsoft ≫ Exchange Server Version2019 Update-
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_1
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_10
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_11
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_12
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_13
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_2
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_3
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_4
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_5
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_6
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_7
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_8
Microsoft ≫ Exchange Server Version2019 Updatecumulative_update_9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.22% | 0.448 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
secure@microsoft.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
CWE-1286 Improper Validation of Syntactic Correctness of Input
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.