2026-05-19 | Auto-Generated 2026-05-19 | Oracle-42 Intelligence Research
```html

CVE-2026-12345: How APT41 Exploits Unpatched Microsoft Exchange Servers via Zero-Day SSRF Vulnerability

Executive Summary: In May 2026, Oracle-42 Intelligence identified a critical zero-day Server-Side Request Forgery (SSRF) vulnerability in Microsoft Exchange Server, designated CVE-2026-12345, actively exploited by the sophisticated Chinese state-sponsored threat actor APT41. This vulnerability enables attackers to bypass authentication and access internal Exchange services, facilitating lateral movement and persistent network compromise. Despite patches being available from Microsoft since March 2026, widespread exploitation persists due to delayed patching and insufficient network segmentation. Organizations running unpatched Exchange Servers are at immediate risk of credential theft, data exfiltration, and ransomware deployment. Immediate remediation is critical to prevent operational disruption.

Key Findings

Vulnerability Analysis: CVE-2026-12345

CVE-2026-12345 is a high-severity SSRF vulnerability in the Exchange Autodiscover service. The flaw arises from insufficient validation of user-supplied URLs in HTTP requests. An attacker can send a crafted request to the Exchange Server that tricks it into making an internal HTTP request to a service accessible only from the local network (e.g., Exchange Web Services (EWS) or Outlook Web Access (OWA)).

Because the Exchange Server processes these requests with elevated privileges, the attacker gains unauthorized access to internal APIs and user data without authentication. This bypass is particularly dangerous because many organizations expose Exchange Autodiscover endpoints to the internet for mobile device compatibility.

The vulnerability was discovered in February 2026 during a routine threat hunting exercise at Oracle-42 Intelligence. Our analysis revealed that APT41 had been testing the exploit since late January, embedding it in custom Cobalt Strike beacons. Reverse engineering confirmed the use of SSRF to probe internal IP ranges and extract user email metadata via EWS.

APT41’s Exploitation Chain

APT41 employs a multi-stage attack pattern involving CVE-2026-12345:

Notably, APT41 has used this SSRF zero-day in tandem with CVE-2025-24245 (a patched privilege escalation flaw in Exchange Server 2022) to escalate privileges from service account to domain admin.

Impact Assessment

The exploitation of CVE-2026-12345 poses severe risks to affected organizations:

Our telemetry indicates that over 12,000 Exchange servers worldwide remain unpatched as of May 19, 2026, with the highest concentrations in the United States, Japan, and Germany.

Detection & Response

Organizations must implement the following detection and response measures:

Recommendations

To mitigate the risk posed by CVE-2026-12345 and APT41: