Top Stories

SharePoint Servers Hacked: Zero-Day Vulnerability Exploited

SharePoint Servers Under Siege: Zero-Day Vulnerability Exploited

Microsoft SharePoint servers are facing a critical threat as malicious actors exploit a remote code execution (RCE) vulnerability to gain unauthorized access. This vulnerability, actively targeting on-premise servers at thousands of organizations, poses a significant risk even after patching, according to security researchers. Let’s delve into the details of this alarming situation.

The ToolShell Zero-Day Vulnerability (CVE-2025-53770)

Eye Security, a European cybersecurity firm, first reported the vulnerability on July 18th. The vulnerability, now identified as CVE-2025-53770, allows attackers to bypass traditional security measures like brute-force attacks and phishing. This zero-day exploit, meaning it was previously unknown to the software vendor, gives attackers a significant advantage.

Microsoft has acknowledged the active exploitation of this vulnerability and released a security patch for SharePoint Subscription Edition and SharePoint 2019 servers. However, a patch for SharePoint 2016 servers is still pending.

Understanding the Impact

The US CISA (Cybersecurity and Infrastructure Security Agency) warns that successful exploitation of this vulnerability allows attackers to execute code remotely and gain complete access to SharePoint content. This includes sensitive internal configurations and file systems.

  • Data Breach: Attackers can steal confidential documents, financial records, and other sensitive data stored on SharePoint servers.
  • System Compromise: Attackers can install malware, create backdoors, and gain persistent access to the network.
  • Reputational Damage: A successful attack can damage an organization’s reputation and erode customer trust.

Persistent Access: A Major Concern

Researchers highlight a particularly alarming aspect of this exploit: attackers can use stolen keys to impersonate legitimate users. This allows them to modify system components and install malicious code that persists even after security patches are applied or the systems are rebooted. This persistent access makes remediation significantly more challenging.

Global Exploitation Observed

Palo Alto Networks’ Unit 42 has reported observing “active global exploitation” of these SharePoint vulnerabilities, targeting organizations worldwide. Further details of these attacks are available on Unit 42’s GitHub threat intel repository.

Mitigation and Prevention

Microsoft strongly advises the following steps to mitigate the risk:

  • Apply the July 2025 Security Updates: Install the latest security patches for your SharePoint servers as soon as they become available.
  • Enable Antimalware Scan Interface (AMSI): Integrate AMSI into your SharePoint environment to detect and block malicious scripts and code.
  • Deploy Microsoft Defender or Similar Solutions: Implement a robust endpoint detection and response (EDR) solution to monitor your systems for suspicious activity.

The Technical Details

The CVE-2025-53770 vulnerability is a weaponized version of an exploit demonstrated at the Pwn2Own Berlin security contest. It leverages a flaw in how SharePoint handles certain types of requests, allowing attackers to inject malicious code into the server’s memory.

Analyzing the Attack Vector

Attackers typically exploit this vulnerability by sending specially crafted HTTP requests to the SharePoint server. These requests contain malicious code that is executed by the server, granting the attacker control over the system.

Post-Exploitation Activities

Once the attacker has gained access to the server, they can perform a variety of malicious activities, including:

  • Installing malware
  • Stealing data
  • Creating new user accounts with administrative privileges
  • Disrupting services

Timeline of Events

Date Event
July 18, 2025 Eye Security reports the zero-day vulnerability.
July 20, 2025 Microsoft acknowledges active exploitation and releases a security patch.

Staying Protected

This zero-day vulnerability highlights the importance of proactive security measures. Organizations should regularly review their security posture, implement robust security controls, and stay informed about the latest threats and vulnerabilities. By taking these steps, organizations can significantly reduce their risk of falling victim to attacks targeting SharePoint servers.

Recommendations

  • Regular Security Audits: Conduct regular security audits to identify and address potential vulnerabilities in your SharePoint environment.
  • Employee Training: Train employees on how to identify and avoid phishing attacks and other social engineering tactics.
  • Incident Response Plan: Develop and test an incident response plan to effectively respond to security incidents.
  • Monitor Security Advisories: Stay informed about the latest security advisories and patches from Microsoft and other security vendors.

eternalsolutionus@gmail.com

Ankit Vishwakarma is a key author at Newsm, contributing his expertise cultivated over 4 years in creative writing. He's dedicated to producing high-quality content that informs, entertains, and connects with readers.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
generate creative answers to questions (faqs) about your business or website. Esports 2020 competition live event. refund policy cinepunch.