<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SharePoint Archives - Engagy360</title>
	<atom:link href="https://engagy360.com/tag/sharepoint/feed/" rel="self" type="application/rss+xml" />
	<link>https://engagy360.com/tag/sharepoint/</link>
	<description>We create limitless Digital Workplaces</description>
	<lastBuildDate>Wed, 14 Jan 2026 10:05:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Microsoft SharePoint zero-day exploit (CVE-2025-53770)</title>
		<link>https://engagy360.com/blog/microsoft-sharepoint-zero-day-exploit-cve-2025-53770/</link>
					<comments>https://engagy360.com/blog/microsoft-sharepoint-zero-day-exploit-cve-2025-53770/#respond</comments>
		
		<dc:creator><![CDATA[Tomasz Szałaj]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 11:02:48 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[SharePoint]]></category>
		<guid isPermaLink="false">https://engagy360.com/?p=980</guid>

					<description><![CDATA[<p>On July 19, 2025, Microsoft published a description of the zero-day CVE-2025-53770 vulnerability that allows attacking Microsoft SharePoint on-premises servers through unauthorized remote code execution, posing a serious threat to companies and institutions storing sensitive data on their own infrastructure. SharePoint Online cloud servers are not vulnerable to the above vulnerability. The above vulnerability allows [&#8230;]</p>
<p>The post <a href="https://engagy360.com/blog/microsoft-sharepoint-zero-day-exploit-cve-2025-53770/">Microsoft SharePoint zero-day exploit (CVE-2025-53770)</a> appeared first on <a href="https://engagy360.com">Engagy360</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On July 19, 2025, Microsoft published a description of the zero-day <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770" target="_blank" rel="noopener">CVE-2025-53770</a> vulnerability that allows attacking Microsoft SharePoint on-premises servers through unauthorized remote code execution, posing a serious threat to companies and institutions storing sensitive data on their own infrastructure. <strong>SharePoint Online cloud servers are not vulnerable to the above vulnerability.</strong></p>
<p>The above vulnerability allows the deserialization of untrusted data bypassing authentication, and allows an attacker to bypass fixes made in July security bulletins for vulnerabilities <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704" target="_blank" rel="noopener">CVE-2025-49704</a> and <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706" target="_blank" rel="noopener">CVE-2025-49706</a>. <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771" target="_blank" rel="noopener">CVE-2025-53771</a>, a patch bypass for another vulnerability from the ToolShell chain (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706" target="_blank" rel="noopener">CVE-2025-49706</a>), which allows an unauthenticated user to access information without affecting service availability, was published simultaneously. Both security vulnerabilities &#8211; for unauthorized access to data and unauthorized code execution &#8211; were disclosed at Trend Micro&#8217;s Zero Day Initiative Pwn2Own Berlin 2025, but the new patches contain more robust protections than their originals developed at that conference.</p>
<h2>Attack mechanism</h2>
<ul>
<li>The attacker sends a crafted POST request to the endpoint /_layouts/*/ToolPane.aspx which deserializes malicious objects in the IIS context.</li>
<li>After obtaining code execution, the webshell spinstall0.aspx is installed in the Layouts directory.</li>
<li>From the webshell, the ValidationKey and DecryptionKey cryptographic keys are extracted.</li>
<li>Using the stolen keys, the attackers sign further requests to the server and fully take control of the server, regardless of the subsequent removal of the webshell.</li>
</ul>
<h2>Vulnerable SharePoint Versions and Recommended Protective Actions</h2>
<p>To protect against vulnerabilities, immediately apply the latest patches for all supported versions of SharePoint Server 2016, 2019 and Subscription Edition and make sure Antimalware Scan Interface (AMSI) integration is enabled and properly configured, preferably in Full Mode with Microsoft Defender Antivirus on SharePoint servers.</p>
<p>After installing patches and running AMSI, it&#8217;s a good idea to rotate ASP.NET Machine Keys and restart IIS according to SharePoint documentation.</p>
<p>If it is not possible to patch immediately, disconnect SharePoint servers from the Internet or restrict traffic to an authenticated VPN/proxy.</p>
<p>The SharePoint versions affected by the vulnerability and their corresponding security updates are summarized below.</p>

<table id="tablepress-4" class="tablepress tablepress-id-4">
<thead>
<tr class="row-1">
	<th class="column-1">SharePoint version</th><th class="column-2">Amendment number</th><th class="column-3">KB</th>
</tr>
</thead>
<tbody class="row-striping row-hover">
<tr class="row-2">
	<td class="column-1">SharePoint Server Subscription Edition</td><td class="column-2">16.0.18526.20508</td><td class="column-3"><a href="https://www.microsoft.com/en-us/download/details.aspx?id=108285" target="_blank">KB5002768</a></td>
</tr>
<tr class="row-3">
	<td class="column-1">SharePoint Server 2019</td><td class="column-2">16.0.10417.20037</td><td class="column-3"><a href="https://www.microsoft.com/en-us/download/details.aspx?id=108286" target="_blank">KB5002754</a> (server) and <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108287" target="_blank">KB5002753</a> (language pack)</td>
</tr>
<tr class="row-4">
	<td class="column-1">SharePoint Enterprise Server 2016</td><td class="column-2">16.0.5513.1001</td><td class="column-3"><a href="https://www.microsoft.com/en-us/download/details.aspx?id=108288" target="_blank">KB5002760</a> (server) and <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108289" target="_blank">KB5002759</a> (language pack)</td>
</tr>
</tbody>
</table>

<h2>Attacks exploiting CVE-2025-53770 vulnerability</h2>
<p>The first attempts to exploit the CVE-2025-53770 vulnerability were reported as early as July 7, 2025, against government infrastructure in the US and Western Europe. Microsoft has officially confirmed active attempts to exploit the vulnerabilities, so far more than 80 SharePoint installations have been confirmed infected using the vulnerability, including a SharePoint farm belonging to the National Nuclear Security Administration, part of the US government&#8217;s Department of Energy.</p>
<p>Researchers noted that Chinese state groups Linen Typhoon and Violet Typhoon and the Storm-2603 actor were involved in the attack attempts, using the ToolShell chain for unauthorized access.</p>
<p>The post <a href="https://engagy360.com/blog/microsoft-sharepoint-zero-day-exploit-cve-2025-53770/">Microsoft SharePoint zero-day exploit (CVE-2025-53770)</a> appeared first on <a href="https://engagy360.com">Engagy360</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://engagy360.com/blog/microsoft-sharepoint-zero-day-exploit-cve-2025-53770/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
