Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Posted on July 21, 2025July 21, 2025 By CWS

Microsoft has issued an pressing safety advisory addressing crucial zero-day vulnerabilities in on-premises SharePoint Server that attackers are actively exploiting. 

The vulnerabilities, assigned as CVE-2025-53770 and CVE-2025-53771, pose quick dangers to organizations working SharePoint infrastructure and require quick remediation.

Key Takeaways1. Lively zero-day assaults focusing on on-premises SharePoint servers by way of CVE-2025-53770 and CVE-2025-53771.2. Apply safety updates instantly: KB5002768 (Subscription Version) or KB5002754 (SharePoint 2019).3. Microsoft Defender is deployed with menace detection and searching capabilities.

Zero-Day Vulnerabilities Underneath Lively Exploitation

The safety flaws particularly goal on-premises SharePoint Server installations, whereas SharePoint On-line in Microsoft 365 stays unaffected. 

Microsoft’s Safety Response Middle confirmed that menace actors are actively exploiting these vulnerabilities, which had been solely partially addressed within the preliminary July 2025 Safety Replace. 

The vulnerabilities allow attackers to realize distant code execution and doubtlessly compromise complete SharePoint environments.

Safety researchers have recognized that profitable exploitation leads to the creation of malicious recordsdata resembling spinstall0.aspx, which serves as an indicator of compromise. 

The assault vectors contain subtle strategies that bypass conventional safety controls, making quick patching crucial for organizational safety.

CVETitleAffected ProductsSeverityCVE-2025-53770CVE-2025-53771SharePoint Server Distant Code Execution VulnerabilitySharePoint Server 2016, 2019, Subscription EditionCritical

Safety Updates

Microsoft has launched complete safety updates to deal with these vulnerabilities. For SharePoint Server Subscription Version, organizations should apply safety replace KB5002768, whereas SharePoint Server 2019 requires KB5002754. 

SharePoint 2016 updates are nonetheless in improvement, leaving these techniques quickly weak.

The corporate recommends implementing a number of defensive layers instantly. Organizations should allow the Antimalware Scan Interface (AMSI) in Full Mode, which supplies crucial safety in opposition to unauthenticated assaults. 

Moreover, deploying Microsoft Defender Antivirus on all SharePoint servers creates a vital safety barrier.

An important post-patching step includes rotating SharePoint Server ASP.NET machine keys utilizing both the Replace-SPMachineKey PowerShell cmdlet or the Central Administration interface. 

After key rotation, directors should restart IIS utilizing iisreset.exe on all SharePoint servers to finish the remediation course of.

Microsoft has deployed a number of detection mechanisms by way of its safety ecosystem. Microsoft Defender Antivirus now identifies threats below detection names Exploit:Script/SuspSignoutReq.A and Trojan:Win32/HijackSharePointServer.A. 

These signatures present real-time safety in opposition to identified exploitation makes an attempt.

Microsoft Defender for Endpoint generates particular alerts, together with “Attainable net shell set up,” “Suspicious IIS employee course of conduct,” and “SuspSignoutReq malware was blocked on a SharePoint server”. 

Safety groups can leverage superior searching queries to establish potential compromise indicators throughout their setting.

Organizations can make the most of Microsoft Defender Vulnerability Administration to evaluate publicity ranges by filtering for the precise CVE identifiers within the Software program vulnerabilities part. 

The unified superior searching question DeviceTvmSoftwareVulnerabilities | the place CveId in (“CVE-2025-49706″,”CVE-2025-53770”) permits complete vulnerability monitoring throughout enterprise environments.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:0Day, Critical, Emergency, Microsoft, Patch, Released, Security, SharePoint, Update, Vulnerability

Post navigation

Previous Post: New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator
Next Post: Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Related Posts

Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News