Microsoft has released an emergency, out-of-band security update to address a critical privilege escalation vulnerability in on-premise Microsoft Exchange Server 2016 and 2019. The vulnerability, identified as CVE-2026-21445, has a CVSS score of 9.1. It is a post-authentication flaw, meaning an attacker must first possess credentials for a low-privilege user account. However, once authenticated, they can exploit the flaw to elevate their privileges to Domain Administrator, granting them complete control over the target's Active Directory forest. While there is no evidence of active exploitation yet, Microsoft deemed the flaw severe enough to warrant a patch outside the normal Patch Tuesday cycle. Administrators are strongly advised to apply the update with the highest priority.
Exchange Online is not affected.
As of the patch release on February 22, 2026, Microsoft has stated there is no evidence of active exploitation in the wild. However, the public disclosure and the relative simplicity of the exploit (as described by the Zero Day Initiative) mean that threat actors will likely reverse-engineer the patch and develop exploits quickly. The out-of-band nature of the release underscores the high risk of future exploitation.
A vulnerability that allows for escalation to Domain Admin is one of the most critical types of flaws in a Windows environment. A Domain Admin can control every user, computer, and server in the domain. An attacker with this level of access can deploy ransomware across the entire network, steal any data they want, create new administrator accounts for persistence, and erase their tracks. Given that the only prerequisite is a single set of low-privilege credentials—which can be easily obtained via phishing—the potential for a complete organizational compromise is extremely high.
D3-DAM: Domain Account Monitoring to detect anomalous additions or modifications to privileged Active Directory groups.The primary mitigation is to apply the security update provided by Microsoft immediately.
Mapped D3FEND Techniques:
Regularly audit membership of privileged groups like Domain Admins and implement alerting for any changes.
Mapped D3FEND Techniques:
Enforcing MFA makes it harder for attackers to obtain the initial low-privilege credentials required to launch this attack.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats