Cyber Security News

Microsoft Exchange Admin Center Down Globally

Microsoft has confirmed a global outage affecting the Exchange Admin Center (EAC), leaving administrators unable to access critical management tools.

The issue, which has been designated as a critical service incident under ID EX1051697, is causing widespread disruptions across organizations relying on Exchange Online.

Administrators attempting to log in to the EAC are encountering an “HTTP Error 500,” signaling an internal server failure. This error prevents access to essential administrative functions, including mailbox and group management.

Microsoft has acknowledged the issue and is actively investigating its scope, which appears to be global.

In response to the outage, some administrators have reported success accessing the EAC through an alternative URL: https://admin.cloud.microsoft/exchange#/.

Microsoft is currently validating this workaround and will provide confirmation shortly. Administrators are advised to try this temporary solution while awaiting further updates.

Investigation Progress

Microsoft engineers have identified spikes in error rates and are reviewing recent service changes as potential contributors to the problem.

The company has reproduced the issue internally and collected diagnostic data to assist in troubleshooting. Service monitoring telemetry is being analyzed to isolate the root cause and determine the next steps.

Microsoft stated, “We’ve identified increases in error spikes and are investigating these further. Additionally, we’re reviewing recent changes made to the service as a potential root cause.”

The EAC serves as a vital tool for administrators managing Exchange Online environments, particularly for organizations with complex setups. While PowerShell can be used for certain administrative tasks, many users prefer the web-based interface for its ease of use.

Microsoft has assured customers that resolving this outage is a top priority. Administrators are encouraged to monitor updates via the Microsoft 365 Admin Center for real-time information.

The company has not yet provided an estimated timeline for resolution but continues to work on identifying and addressing the root cause.

This story is developing, and further updates will follow as new information becomes available. Administrators experiencing issues should consider using the suggested workaround URL or alternative management methods until normal service resumes.

Update: “We’re currently investigating routing logs to identify the root cause as well as testing a potential mitigation by re-routing user requests to working URLs,” Microsoft said.

Application Security is no longer just a defensive play, Time to Secure -> Free Webinar

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Microsoft Sued for Allegedly Misleading Millions to Subscribe for Microsoft 365 Subscriptions

Australia's competition regulator has filed legal proceedings against Microsoft for allegedly misleading approximately 2.7 million…

30 minutes ago

Magento Input Validation Vulnerability Exploited In Wild To Hijack Session And Execute Malicious Codes

A critical vulnerability in Magento, the popular e-commerce platform, is now rebranded as Adobe Commerce.…

36 minutes ago

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Microsoft has issued a critical security update for ASP.NET Core to address CVE-2025-55315, a high-severity…

57 minutes ago

Docker Compose Vulnerability Allow Attacks To Overwrite Arbitrary Files

Docker Compose, a cornerstone tool for developers managing containerized application harbors a high-severity vulnerability that…

2 hours ago

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing…

4 hours ago

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject…

5 hours ago