WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 (TLP:CLEAR) Vulnerability Notification - Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Vulnerability Notification – Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897

TLP:CLEAR

Author: Chase Snow

Created: Tuesday, May 19, 2026 - 14:05

Categories: Cybersecurity, Security Preparedness

ACTION MAY BE REQUIRED for utilities using on-premises Microsoft Exchange Server environments with Outlook Web Access (OWA) enabled, particularly internet-facing Exchange infrastructure.Utilities that outsource technology support may need to consult their service providers for assistance with remediation actions.

Summary: A critical zero-day vulnerability affecting Microsoft Exchange Outlook Web Access (OWA) is being actively exploited in the wild. Tracked as CVE-2026-42897, the vulnerability is a cross-site scripting (XSS) flaw that could allow an unauthorized remote attacker to execute arbitrary JavaScript within a user’s browser session after sending a specially crafted email. Microsoft confirmed active exploitation and assigned the vulnerability a Common Vulnerability Scoring System (CVSS) score of 8.1 (High).

Analyst Note: This vulnerability is particularly concerning for utilities because Microsoft Exchange environments often support sensitive operational, administrative, and executive communications. Successful exploitation could allow threat actors to compromise OWA mailboxes, steal session tokens, manipulate email content establish malicious forwarding rules, and conduct business email compromise (BEC) activity. Utilities with internet-facing Exchange infrastructure may face increased risk.

WaterISAC strongly encourages members review Microsoft’s guidance immediately and verify whether affected Exchange infrastructure is internet accessible. Microsoft recommends two main mitigation options, which include:

  • Option 1 (recommended): enable and validate the Exchange Emergency Mitigation (EM) service, which automatically applies available mitigations to supported Exchange environments.
  • Option 2 (for organizations unable to use the EM service): utilize a scripted mitigation option through Exchange On-premises Mitigation Tool (EOMT).

Additional Reading:

  • Microsoft Exchange Zero-Day Under Attack, No Patch Available

Related WaterISAC PIRs: 6, 8, 10

Related Resources

(TLP:CLEAR) Vulnerability Notification – Critical Vulnerability Affecting Cisco Catalyst SD-WAN, CVE-2026-20182

May 19, 2026 in Cybersecurity, Security Preparedness

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar