Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack

New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack

18 May 2026
Trump says China agreed to buy  billion of American beef per year

Trump says China agreed to buy $17 billion of American beef per year

18 May 2026
BCI Can Reach Millions. Neurotech Decided It Shouldn’t

BCI Can Reach Millions. Neurotech Decided It Shouldn’t

18 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now
Innovation

Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

Press RoomBy Press Room18 May 20266 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

Updated May 18: This article has been updated to include further details on the emergency mitigation process recommended by Microsoft after the CVE-2026-42897 Exchange Server zero-day was confirmed by the U.S. Cybersecurity and Infrastructure Security Agency as already being actively exploited in the wild by attackers. Alongside this, there is a second update concerning yet another zero-day exposure from an ‘angry hacker’ who has added to the long list of publicly disclosed vulnerabilities by posting details of a Windows 11 ‘proof of concept’ exploit that gives an attacker system privileges even when Windows is running fully patched and up to date..

It’s been something of a rough few days for Microsoft Exchange on the security vulnerability front. A zero-day being demonstrated at the Pwn2Own Berlin hacking event, which has been responsibly disclosed and not released into the wild. Definitely already out there, and under active exploitation according to the U.S. Cybersecurity and Infrastructure Security Agency, another Exchange zero-day, confirmed by Microsoft on May 14. CISA added the CVE-2026-42897 vulnerability to its Known Exploited Vulnerabilities Catalog on May 15, urging all organizations to prioritize timely remediation as the attack vector poses a significant risk. Here’s what you need to know.

The Microsoft Exchange CVE-2026-42897 Zero-Day Explained

Microsoft disclosed CVE-2026-42897 on May 14, describing the zero-day as a Microsoft Exchange Server spoofing vulnerability. Technically speaking, the vulnerability occurs when an improper neutralization of input during web page generation, or a cross-site scripting attack if you prefer, enables an attacker to perform spoofing over the network. All it takes to exploit this is to send a maliciously crafted email, which, when opened in Outlook Web Access, can execute arbitrary JavaScript in the context of the browser.

“The disclosure of CVE-2026-42897 is a reminder that on-premises Exchange remains the most targeted piece of real estate in the enterprise stack,” Damon Small, a director at Xcape, Inc., said, adding that “this zero-day allows unauthenticated remote code execution, effectively granting attackers a direct path to the heart of corporate identity and communications.”

Exchange Online is not impacted by the zero-day, but the following on-premises Exchange Server versions are:

  • Exchange Server 2016 (any update level)
  • Exchange Server 2019 (any update level)
  • Exchange Server Subscription Edition (SE) (any update level)

Microsoft Says Check Exchange Server Emergency Mitigation Statistics Now

Microsoft has recommended mitigation via the Exchange Emergency Mitigation Service as the patch has already been published through it. “Using EM Service is the best way for your organization to mitigate this vulnerability right away,” Microsoft said; “If you have EM Service currently disabled, we recommend you enable it right away.”

To check the status of the Exchange Emergency Mitigation Service, organizations should run the Exchange Health Checker script provided by Microsoft. “The HTML report will include a section on EEMS check results,” Microsoft has confirmed. This will also verify that your “servers have applied the mitigation for CVE-2026-42897,” Microsoft said, advising that M2.1.x is the relevant mitigation ID to look for.

“Because a formal patch is still pending,” Small warned, “organizations are forced into a mitigation-only posture, relying on the Emergency Mitigation Service to essentially apply a virtual band-aid to a critical wound.’ The priority, therefore, must be immediate validation that the EM Service is actually functional and applying the necessary URI blocks as, “a single misconfigured server can serve as the beachhead for a full domain compromise.” Small also noted that this incident should be the catalyst to accelerate a move from Exchange Server to Microsoft Exchange Online in the enterprise, or, “at the very least, to isolate these servers behind a zero-trust gateway.”

“Exchange remains one of the most dangerous places for a remote code execution flaw to land,” Jacob Krell, senior director of secure AI solutions and Cybersecurity at Suzu Labs, said, as it “sits close to identity and inside the communication layer most organizations depend on every day.” Krell also warned that “attackers study mitigation guidance the same way defenders do,” meaning that such vulnerabilities can be turned into working exploits “much faster than most organizations can validate exposure.” The message is clear, especially as it has now been confirmed by both CISA and Microsoft itself that attacks are already underway, that checking to ensure the Exchange Emergency Mitigation Service is enabled and the relevant mitigation ID for CVE-2026-42897 applied is not an option; it’s a critical confirmation that your on-premises Microsoft Exchange Server is not at risk of being exploited.

Angry Microsoft Windows Hacker Releases Yet Another Zero-Day Exploit

It’s not just Microsoft Exchange that is having a bad time with regard to zero-day vulnerabilities. As I have previously reported, a hacker with a grudge against the way Microsoft Security Response Center has dealt with their vulnerability reports, known as Chaotic Eclipse, has been publicly disclosing Windows zero-day exploits for some weeks now. The latest, which has been given the designation of MiniPlasma, impacts users of Windows 11 and was published on May 16, enabling a successful attacker to gain system privileges even on an up-to-date and fully security-patched machine.

Chaotic Eclipse appears to have an issue with the way that the Microsoft Security Response Center has treated him, and has said that “I was told personally by them that they will ruin my life and they did,” and that “they mopped the floor with me and pulled every childish game they could. It was so bad at some point I was wondering if I was dealing with a massive corporation or someone who is just having fun seeing me suffer, but it seems to be a collective decision.”

The zero-day actually exploits a vulnerability first reported in September 2020, by James Forshaw from the Google Project Zero research team. Officially labeled as CVE-2020-17103, the vulnerability was thought to have been patched by Microsoft in December the same year. Chaotic Eclipse, however, re-investigated the technique used in the GreenPlasma exploit they recently disclosed, and said that the same issue “is actually still present, unpatched.” As a result, the hacker said that to “highlight this issue, I weaponized the original PoC to spawn a SYSTEM shell.” Tests have shown that this certainly works on a fully patched Windows 11 Pro system, and Chaotic Eclipse warned that “I believe all Windows versions are affected by this vulnerability.” At the time of publication, there is no available advice on mitigating this issue, other than to wait for Microsoft to address it with an updated patch, as far as I am aware. I have reached out to Microsoft for a statement.

CISA CVE-2026-42897 Exchange Exchange zero-day under active exploitation KEV Catalog Microsoft Exchange Zero-Day Attack Microsoft Security Warning Mitigate Right Now Emergency’ Patch Microsoft Exchange now
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack

New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack

18 May 2026
BCI Can Reach Millions. Neurotech Decided It Shouldn’t

BCI Can Reach Millions. Neurotech Decided It Shouldn’t

18 May 2026
How Critical Industries Can Bridge The AI-Talent Gap

How Critical Industries Can Bridge The AI-Talent Gap

18 May 2026
How To Make The Most Of Apple’s New iPhone Messaging Upgrade

How To Make The Most Of Apple’s New iPhone Messaging Upgrade

18 May 2026
No, Hantavirus Is Not COVID-26 And Other Misinformation Being Spread

No, Hantavirus Is Not COVID-26 And Other Misinformation Being Spread

18 May 2026
There’s An Ebola Outbreak. Here’s What Could Happen Next, From A Doctor

There’s An Ebola Outbreak. Here’s What Could Happen Next, From A Doctor

18 May 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Exclusive: DeFi platform Azura launches after raising .9 million from Initialized

Exclusive: DeFi platform Azura launches after raising $6.9 million from Initialized

22 October 2024
Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

18 May 20263 Views
Trump’s new corporate playbook: Why the administration is taking equity stakes in firms like Intel

Trump’s new corporate playbook: Why the administration is taking equity stakes in firms like Intel

18 May 20262 Views
How Critical Industries Can Bridge The AI-Talent Gap

How Critical Industries Can Bridge The AI-Talent Gap

18 May 20262 Views
Anaplan CEO: AI isn’t eating software. It’s sorting it

Anaplan CEO: AI isn’t eating software. It’s sorting it

18 May 20261 Views

Recent Posts

  • New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack
  • Trump says China agreed to buy $17 billion of American beef per year
  • BCI Can Reach Millions. Neurotech Decided It Shouldn’t
  • Moviegoers still hungry for sanitized Michael Jackson biopic, knocking ‘Devil Wears Prada 2’ off top spot
  • Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

Recent Comments

No comments to show.
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack

New Password Stealer Spoofs Apple, Google And Microsoft In 1 Attack

18 May 2026
Trump says China agreed to buy  billion of American beef per year

Trump says China agreed to buy $17 billion of American beef per year

18 May 2026
BCI Can Reach Millions. Neurotech Decided It Shouldn’t

BCI Can Reach Millions. Neurotech Decided It Shouldn’t

18 May 2026
Most Popular
Moviegoers still hungry for sanitized Michael Jackson biopic, knocking ‘Devil Wears Prada 2’ off top spot

Moviegoers still hungry for sanitized Michael Jackson biopic, knocking ‘Devil Wears Prada 2’ off top spot

18 May 20261 Views
Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

Microsoft Confirms Active 0-Day Exploit—Check Emergency Mitigation Now

18 May 20263 Views
Trump’s new corporate playbook: Why the administration is taking equity stakes in firms like Intel

Trump’s new corporate playbook: Why the administration is taking equity stakes in firms like Intel

18 May 20262 Views

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • March 2022
  • January 2021
  • March 2020
  • January 2020

Categories

  • Blog
  • Business
  • Entrepreneurs
  • Global
  • Innovation
  • Leadership
  • Living
  • Money & Finance
  • News
  • Press Release
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.