Cyber Posture

CVE-2025-58107

High

Published: 02 March 2026

Published
02 March 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 5.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-58107 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Medium (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Sniffing (T1040) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-319

Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.

addresses: CWE-319

By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.

addresses: CWE-319

Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.

addresses: CWE-319

Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.

addresses: CWE-319

Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.

addresses: CWE-319

Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.

addresses: CWE-319

Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.

addresses: CWE-319

Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.

MITRE ATT&CK Enterprise TechniquesAI

T1040 Network Sniffing Credential Access
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Cleartext transmission of credentials/tokens directly enables passive network sniffing (T1040) to obtain unsecured credentials (T1552) for theft and subsequent account access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on on-premises servers may transmit sensitive data from Samsung mobile devices in cleartext, including the user's name, e-mail address, device ID, bearer token, and base64-encoded password.

Deeper analysisAI

CVE-2025-58107 affects Microsoft Exchange servers through 2019, specifically Exchange ActiveSync (EAS) configurations on on-premises servers. The vulnerability causes sensitive data from Samsung mobile devices to be transmitted in cleartext during communication, exposing the user's name, e-mail address, device ID, bearer token, and base64-encoded password. Classified as CWE-319 (Cleartext Transmission of Sensitive Information), it has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting high confidentiality impact from network-accessible exploitation.

Any attacker positioned to observe network traffic between a Samsung mobile device and the vulnerable Exchange server can exploit this issue through passive eavesdropping, requiring no privileges, user interaction, or special access. Successful interception yields the cleartext sensitive data, enabling credential theft, token misuse for authentication bypass, or further attacks such as account takeover and lateral movement within the organization's email environment.

A detailed technical analysis of the vulnerability is provided in the referenced Medium article at https://geochen.medium.com/microsoft-activesync-legacy-protocol-plaintext-credential-and-token-exposure-vulnerability-b0fad89014fa, published alongside the CVE on 2026-03-02. Security practitioners should review it for implementation specifics and mitigation guidance, as no official patch details are included in the core CVE information.

Details

CWE(s)

Affected Products

Medium
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-70048Shared CWE-319
CVE-2025-0556Shared CWE-319
CVE-2026-30795Shared CWE-319
CVE-2024-44276Shared CWE-319
CVE-2026-22271Shared CWE-319
CVE-2026-23661Shared CWE-319
CVE-2025-13718Shared CWE-319
CVE-2025-69272Shared CWE-319
CVE-2026-32838Shared CWE-319
CVE-2025-67159Shared CWE-319

References