Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24362 | Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. |
Fri, 13 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft exchange Server 2016
Microsoft exchange Server 2019 Microsoft exchange Server Se |
|
| CPEs | cpe:2.3:a:microsoft:exchange_server_2016:*:cumulative_update_23:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server_2019:*:cumulative_update_14:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server_2019:*:cumulative_update_15:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server_se:*:RTM:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft exchange Server 2016
Microsoft exchange Server 2019 Microsoft exchange Server Se |
Wed, 03 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:exchange_server:*:*:*:*:subscription:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_1:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_21:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_2:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_3:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_4:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_5:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_6:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_7:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_10:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_13:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:* |
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft exchange Server |
|
| Vendors & Products |
Microsoft
Microsoft exchange Server |
Tue, 12 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. | |
| Title | Microsoft Exchange Server Spoofing Vulnerability | |
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-02-13T18:54:10.939Z
Reserved: 2025-01-30T15:14:20.994Z
Link: CVE-2025-25007
Updated: 2025-08-12T19:07:13.973Z
Status : Analyzed
Published: 2025-08-12T18:15:27.987
Modified: 2025-09-03T14:51:46.130
Link: CVE-2025-25007
No data.
OpenCVE Enrichment
Updated: 2025-08-13T21:48:00Z
EUVD