Microsoft SharePoint Hit by Zero-Day Vulnerability Exploits

Published:

spot_img

Microsoft has alerted users about ongoing cyberattacks that are specifically targeting on-premises SharePoint servers, which are commonly used by both government agencies and businesses. These attacks exploit a critical zero-day vulnerability, risking tens of thousands of servers and prompting immediate protective measures.

Understanding the Cyber Threat to SharePoint Servers

In a security advisory issued on July 20, 2025, Microsoft announced that its investigations revealed these attacks are limited to on-premises SharePoint Servers. Notably, SharePoint Online, the cloud-based variant included in Microsoft 365, is not impacted by this vulnerability.

The Nature of the Vulnerability

The vulnerabilities, identified as CVE-2025-53770 and CVE-2025-53771, allow an authorized attacker to carry out spoofing attacks across networks. Spoofing involves an attacker impersonating a legitimate source to gain unauthorized access, which can result in significant system compromise and potential data breaches.

Zero-Day Exploitation: Immediate Threats

Described as a zero-day attack, this situation is particularly alarming as it involves exploiting a previously undisclosed software flaw before Microsoft has had a chance to release a patch. Reports, including one from The Washington Post, indicate that the vulnerability has been leveraged against various governmental and organizational targets both in the U.S. and abroad.

While Microsoft has not publicly identified the attackers or the scale of affected entities, the potential impact is extensive given SharePoint’s widespread use across sectors like government, healthcare, and education.

Critical Security Updates Released

In response to the ongoing threats, Microsoft has deployed security updates for SharePoint Server Subscription Edition and SharePoint Server 2019. Users are encouraged to apply these updates immediately to safeguard against known vulnerabilities. However, users of SharePoint Server 2016 are still awaiting updates, and Microsoft advises checking their official blog for the latest information.

Mitigation Strategies for SharePoint Users

To assist organizations in minimizing their exposure to these vulnerabilities, Microsoft has outlined several key steps:

  1. Utilize Supported SharePoint Versions
    Confirm that your organization is using supported versions such as SharePoint Server 2016, 2019, or Subscription Edition.
  2. Implement July 2025 Security Updates
    Quick application of the latest security updates is vital. Specific updates include:
    • SharePoint Server 2019: KB5002741
    • SharePoint Enterprise Server 2016: KB5002744
  3. Enable AMSI (Antimalware Scan Interface)
    Integrate AMSI with Defender Antivirus to detect and block malicious activities. This integration was enabled by default in the September 2023 security update for both SharePoint Server 2016 and 2019. In instances where AMSI cannot be enabled, Microsoft advises disconnecting affected servers from the internet until fixes are applied.
  4. Employ Microsoft Defender for Endpoint
    Organizations should integrate Defender for Endpoint or comparable endpoint protection to detect and handle post-exploitation activities.
  5. Rotate ASP.NET Machine Keys and Restart IIS
    After updates or AMSI enabling, it’s critical to rotate the ASP.NET machine keys and restart IIS across all SharePoint servers. This can be accomplished using PowerShell (Update-SPMachineKey cmdlet) or through Central Administration, followed by a restart command using iisreset.exe.

Additionally, Microsoft recommends monitoring detection logs and telemetry using Microsoft Defender Vulnerability Management to identify any signs of exploitation attempts.

Coordinated Response from Federal Authorities

The FBI is actively investigating the attacks, collaborating with various public and private sector stakeholders. While they haven’t shared exhaustive details, they confirmed ongoing efforts to address the situation. Concurrently, the Cybersecurity and Infrastructure Security Agency (CISA) has included CVE-2025-53770 in its Known Exploited Vulnerabilities Catalog, highlighting the serious implications for federal operations and urging organizations to promptly follow Microsoft’s recommended steps.

Reassurance for SharePoint Online Users

Microsoft has confirmed that SharePoint Online users are not vulnerable to these attacks, allowing organizations using the cloud-based version as part of Microsoft 365 to maintain their operations safely. Nevertheless, they are advised to remain vigilant about emerging threats.

Summary of Security Updates

Product KB Article Fixed Build Number
SharePoint Server 2019 KB5002741 16.0.10417.20027
SharePoint Enterprise Server 2016 KB5002744 16.0.5508.1000
SharePoint Subscription Edition KB5002768 Security Update Released
SharePoint Server 2016 (Full Fix) Pending In progress

As Microsoft continues to evaluate the ongoing cyber threats, organizations utilizing on-premises SharePoint servers should take immediate action by:

  • Applying all suggested updates
  • Enabling protective tools and AMSI
  • Rotating machine keys
  • Monitoring systems for potential compromises

Given the active exploitation of these vulnerabilities, prompt action is crucial to protect sensitive information and ensure system integrity.

spot_img

Related articles

Recent articles

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...

Researchers Find Over 30 Vulnerabilities in AI Coding Tools That Risk Data Theft and RCE Attacks

Unveiling the IDEsaster: Security Flaws in AI-Powered Coding Environments Overview of Recent Vulnerabilities A recent investigation has uncovered over 30 security vulnerabilities lurking within popular AI-powered...

XIXILI Transforms Plus-Size Lingerie in Malaysia

## A New Era for Plus Size Lingerie: Introducing XIXILI’s Collection ### Redefining Lingerie Shopping KUALA LUMPUR, MALAYSIA - In a bold move that reshapes the...

LockBit Ransomware Strikes Again: New Data Leak Site and 7 Victims Targeted

The Resurgence of LockBit Ransomware Group: New Developments and Victims The LockBit ransomware group, once a dominant player in the cybercrime arena, is beginning to...