Raleigh, NC

32°F
Scattered Clouds Humidity: 79%
Wind: 2.06 M/S

SharePoint Zero-Day CVE-2025-53770 Actively Exploited in Ongoing Attacks

SharePoint Zero-Day CVE-2025-53770 Actively Exploited in Ongoing Attacks

Microsoft has issued a warning about a critical zero-day vulnerability in SharePoint, identified as CVE-2025-53770 and rated 9.8 on the CVSS scale. The flaw, which is already being actively exploited, remains unpatched. 

The vulnerability stems from improper deserialization of untrusted data in on-premises SharePoint Server. If exploited, an attacker can execute remote code over the network without prior authentication. Viettel Cyber Security, through Trend Micro’s Zero Day Initiative (ZDI), discovered the issue. 

Microsoft confirmed that an exploit is circulating in the wild and urged administrators to apply the mitigation steps outlined in its CVE documentation while a comprehensive fix is being developed and tested. The company also recommends enabling AMSI integration and deploying Microsoft Defender across all SharePoint Server environments to minimize risk. 

CVE-2025-53770 is considered a variant of a previously addressed spoofing bug, CVE-2025-49706, patched during the July 2025 Patch Tuesday. Notably, the vulnerability affects only on-premises versions of SharePoint Server, not SharePoint Online hosted in Microsoft 365. 

Attackers are using the flaw to execute commands by exploiting object deserialization before authentication. They also leverage stolen machine keys to maintain persistence and navigate laterally, complicating detection without strong endpoint visibility. 

Researchers from Eye Security and Palo Alto Networks have documented attacks chaining this vulnerability with others, such as CVE-2025-49706 and CVE-2025-49704, in an exploit sequence known as “ToolShell.” These chains allow hackers to bypass authentication and run code on vulnerable servers. 

On July 18, 2025, Eye Security reported a widespread campaign leveraging this chain, with dozens of SharePoint systems compromised globally. Their team scanned more than 8,000 servers and urged organizations to patch and assess for compromise immediately. 

 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.