Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Microsoft Confirms ‘Active Attacks’ Against SharePoint Servers, Rolls Out Emergency Patches

CRN by CRN
July 21, 2025
Home News
Share on FacebookShare on Twitter


Media reports have pointed to global cyberattacks exploiting vulnerabilities in on-premises SharePoint Servers, which are believed to have compromised victims including the U.S. government.

Microsoft confirmed “active” cyberattacks exploiting vulnerabilities in on-premises SharePoint Servers and released emergency patches for several versions of the systems.

The worldwide attacks are believed have compromised victims including the U.S. government as well as state agencies, universities and corporations, according to a report from the Washington Post.

[Related: Microsoft Patches ‘Wormable’ Critical Flaw, Discloses ‘Whopping’ Number Of Bug Fixes]

CRN has reached out to Microsoft for comment.

In a customer guidance advisory posted online, Microsoft said it “is aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities,” which are tracked at CVE-2025-53770 and CVE-2025-53771.

The flaws only affect on-premises SharePoint Servers and do not impact SharePoint Online in Microsoft 365, Microsoft noted.

The tech giant released emergency patches to address the vulnerabilities in the Microsoft SharePoint Server Subscription Edition and Microsoft SharePoint Server 2019.

However, as of this writing, patches were not yet available for Microsoft SharePoint Server 2016. The company said in the advisory that it is working on the SharePoint Server 2016 fixes.

On Sunday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed that the remote code execution vulnerability tracked at CVE-2025-53770 — and dubbed “ToolShell” — has seen exploitation.

“CISA is aware of active exploitation of a new remote code execution (RCE) vulnerability enabling unauthorized access to on-premise SharePoint servers,” the agency said in an advisory.

“While the scope and impact continue to be assessed, the new Common Vulnerabilities and Exposures (CVE), CVE-2025-53770, is a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations,” CISA said. “This exploitation activity, publicly reported as ‘ToolShell,’ provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network.”

In an email statement provided to CRN, Michael Sikorski, CTO and head of threat intelligence at Palo Alto Networks’ Unit 42, described the attacks as a “high-impact, ongoing threat campaign.”

“If you have SharePoint on-prem exposed to the internet, you should assume that you have been compromised at this point. Patching alone is insufficient to fully evict the threat,” Sikorski said in the statement.

Attackers are “bypassing identity controls, including MFA and SSO, to gain privileged access,” he said in the email statement. “Once inside, they’re exfiltrating sensitive data, deploying persistent backdoors and stealing cryptographic keys. The attackers have leveraged this vulnerability to get into systems and are already establishing their foothold.”

Additionally, “what makes this especially concerning is SharePoint’s deep integration with Microsoft’s platform, including their services like Office, Teams, OneDrive and Outlook, which has all the information valuable to an attacker,” Sikorski said in the statement.

Ultimately, “this is a high-severity, high-urgency threat,” he said in the email statement. “We are urging organizations who are running on-prem SharePoint to take action immediately and apply all relevant patches now and as they become available, rotate all cryptographic material, and engage professional incident response. An immediate, band-aid fix would be to unplug your Microsoft SharePoint from the internet until a patch is available. A false sense of security could result in prolonged exposure and widespread compromise.”



Source link

Tags: CyberattacksCybersecurityMicrosoft SecurityServersVulnerabilities
CRN

CRN

Next Post
Omni Family Institute Launches Together Facing the Challenge App to Empower Agencies and Caregivers

Omni Family Institute Launches Together Facing the Challenge App to Empower Agencies and Caregivers

Recommended.

Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware

Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware

June 17, 2025
Diversity in tech 2024: Collaboration is vital for DEI progress | Computer Weekly

Diversity in tech 2024: Collaboration is vital for DEI progress | Computer Weekly

January 18, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio