Advisory Details

August 6th, 2025

(0Day) Microsoft Exchange PowerShell Exposed Dangerous Method NTLM Relay Vulnerability

ZDI-25-809
ZDI-CAN-23450

CVE ID
CVSS SCORE 8.8, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Exchange
VULNERABILITY DETAILS

This vulnerability allows remote attackers to relay NTLM credentials on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability.

The specific flaw exists within the PowerShell backend. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to relay NTLM credentials in the context of SYSTEM.

ADDITIONAL DETAILS

02/21/24 – ZDI reported the vulnerability to the vendor.
03/19/24 – The vendor assessed the case as low severity.
07/30/25 – ZDI Informed the vendor that we plan to publish the case as a zero-day advisory on 08/06/25.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product.


DISCLOSURE TIMELINE
  • 2024-02-21 - Vulnerability reported to vendor
  • 2025-08-06 - Coordinated public release of advisory
  • 2025-08-06 - Advisory Updated
CREDIT Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
BACK TO ADVISORIES