Description
User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
Published: 2026-02-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Spoofing via UI misrepresentation in Microsoft Exchange Server
Action: Apply patch
AI Analysis

Impact

The vulnerability is a user interface misrepresentation that enables an adversary to spoof critical information displayed to users over the network. This flaw allows an unauthorized attacker to impersonate legitimate communications or services, potentially misleading users into revealing credentials or executing actions they otherwise would not. The weakness is categorized as CWE‑1286 (inconsistent interface semantics) alongside CWE‑345 (boundary checking errors) and CWE‑451 (information exposure). The impact is primarily the compromise of data integrity and user trust, which may lead to credential theft or manipulation of mail flows.

Affected Systems

Affected Microsoft Exchange Server products include the 2016 Cumulative Update 23, and the 2019 Cumulative Update 14 and 15, as well as the Subscription Edition Release To Manufacturing (RTM) version. These updates cover versioned releases of Exchange Server 2016 and 2019, making the vulnerability relevant to environments running any of those cumulative updates or the base subscription edition.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity, but the EPSS score of less than 1% suggests the likelihood of exploitation is currently very low. The flaw is not listed in the CISA KEV catalog, implying no known large‑scale exploitation at present. However, the attack vector is inferred to be network‑based, leveraging normal traffic to the Exchange Server’s web interface without requiring elevated privileges. As the flaw resides in the client‑side UI, any user with access to the affected Exchange web portal could be deceived by the attacker.

Generated by OpenCVE AI on April 15, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Implement the latest Microsoft Exchange Server security updates—namely Cumulative Update 23 for Exchange 2016, Cumulative Update 14 and 15 for Exchange 2019, or the Subscription Edition RTM update—directly from the Microsoft Security Response Center.
  • After applying the update, confirm that the Exchange web interface correctly displays all security and configuration information, ensuring that spoofed notices or links cannot be displayed to users.
  • For additional protection, restrict direct external access to Exchange servers using firewall rules or a reverse proxy, and enforce TLS for all client connections to mitigate the risk of man‑in‑the‑middle spoofing attempts.

Generated by OpenCVE AI on April 15, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft microsoft Exchange Server 2016 Cumulative Update 23
Microsoft microsoft Exchange Server 2019 Cumulative Update 14
Microsoft microsoft Exchange Server 2019 Cumulative Update 15
Microsoft microsoft Exchange Server Subscription Edition Rtm
Vendors & Products Microsoft microsoft Exchange Server 2016 Cumulative Update 23
Microsoft microsoft Exchange Server 2019 Cumulative Update 14
Microsoft microsoft Exchange Server 2019 Cumulative Update 15
Microsoft microsoft Exchange Server Subscription Edition Rtm

Wed, 11 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft exchange Server
CPEs cpe:2.3:a:microsoft:exchange_server:*:*:*:*:subscription:*:*:*
cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_14:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_15:*:*:*:*:*:*
Vendors & Products Microsoft exchange Server

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
Title Microsoft Exchange Server Spoofing Vulnerability
First Time appeared Microsoft
Microsoft exchange Server 2016
Microsoft exchange Server 2019
Microsoft exchange Server Se
Weaknesses CWE-1286
CWE-345
CWE-451
CPEs cpe:2.3:a:microsoft:exchange_server_2016:*:cumulative_update_23:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server_2019:*:cumulative_update_14:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server_2019:*:cumulative_update_15:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server_se:*:RTM:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft exchange Server 2016
Microsoft exchange Server 2019
Microsoft exchange Server Se
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Exchange Server Exchange Server 2016 Exchange Server 2019 Exchange Server Se Microsoft Exchange Server 2016 Cumulative Update 23 Microsoft Exchange Server 2019 Cumulative Update 14 Microsoft Exchange Server 2019 Cumulative Update 15 Microsoft Exchange Server Subscription Edition Rtm
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:17.884Z

Reserved: 2025-12-30T18:10:54.846Z

Link: CVE-2026-21527

cve-icon Vulnrichment

Updated: 2026-02-11T15:33:21.425Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:35.093

Modified: 2026-02-11T21:41:55.400

Link: CVE-2026-21527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses