Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical SharePoint Flaw Exploited in Cyber Attacks

Critical SharePoint Flaw Exploited in Cyber Attacks

Posted on March 19, 2026 By CWS

A significant security vulnerability in Microsoft SharePoint has been identified and is currently being exploited in active cyber attacks. On March 18, 2026, this flaw was officially included in the Known Exploited Vulnerabilities (KEV) catalog by the Cybersecurity and Infrastructure Security Agency (CISA), underscoring the urgency for network administrators to act swiftly.

Understanding the SharePoint Vulnerability

The vulnerability, cataloged as CVE-2026-20963, arises from the manner in which Microsoft SharePoint handles the deserialization of untrusted data. Deserialization is the conversion process that transforms data meant for storage or network transfer into executable objects within an application. When this process is not securely handled, it opens the door for attackers to exploit the system.

This specific flaw allows an unauthorized, remote attacker to send a maliciously crafted data packet to a vulnerable server, which, when processed by SharePoint, executes the attacker’s embedded instructions. This capability to execute arbitrary code on the host system without valid credentials poses a severe risk, particularly as SharePoint environments often contain sensitive corporate information.

Implications and Threat Landscape

The addition of CVE-2026-20963 to the KEV catalog highlights the observed exploitation of this vulnerability in real-world scenarios, although the exact advanced persistent threat (APT) groups responsible remain unidentified. While the link to active ransomware campaigns has not been confirmed, vulnerabilities allowing remote code execution are highly sought after by threat actors.

Once attackers achieve code execution, they can deploy additional payloads, maintain persistent access, and potentially move laterally within the network, escalating the threat to corporate data and communications security.

Mitigation and Recommendations

CISA has issued a directive for Federal Civilian Executive Branch (FCEB) agencies under Binding Operational Directive (BOD) 22-01, mandating the remediation of all vulnerable SharePoint instances by March 21, 2026. Private organizations are advised to follow this timeline to safeguard their systems.

Administrators should immediately review Microsoft’s security advisories and apply all available patches. If patching is not feasible, alternative mitigations must be implemented. In the absence of viable mitigations, CISA recommends discontinuing the use of affected products until a lasting solution is available.

Stay informed by following us on Google News, LinkedIn, and X for ongoing cybersecurity updates. Contact us to share your cybersecurity stories.

Cyber Security News Tags:APT groups, CISA, CVE-2026-20963, Cybersecurity, data breach, federal agencies, Microsoft, network security, Ransomware, risk mitigation, security patch, SharePoint, Vulnerability

Post navigation

Previous Post: WaterPlum’s New Malware Threatens VSCode Security
Next Post: Cisco Firewall Flaw Exploited in Ransomware Attacks

Related Posts

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025 Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025 Cyber Security News
Snake Keyloggers Abuse Java Utilities to Evade Security Tools Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls Cyber Security News
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Cyber Security News
Critical Cisco SD-WAN Vulnerability PoC Exploit Released Critical Cisco SD-WAN Vulnerability PoC Exploit Released Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark