Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Posted on July 21, 2025July 21, 2025 By CWS

Microsoft has issued an pressing safety advisory addressing crucial zero-day vulnerabilities in on-premises SharePoint Server that attackers are actively exploiting. 

The vulnerabilities, assigned as CVE-2025-53770 and CVE-2025-53771, pose quick dangers to organizations working SharePoint infrastructure and require quick remediation.

Key Takeaways1. Lively zero-day assaults focusing on on-premises SharePoint servers by way of CVE-2025-53770 and CVE-2025-53771.2. Apply safety updates instantly: KB5002768 (Subscription Version) or KB5002754 (SharePoint 2019).3. Microsoft Defender is deployed with menace detection and searching capabilities.

Zero-Day Vulnerabilities Underneath Lively Exploitation

The safety flaws particularly goal on-premises SharePoint Server installations, whereas SharePoint On-line in Microsoft 365 stays unaffected. 

Microsoft’s Safety Response Middle confirmed that menace actors are actively exploiting these vulnerabilities, which had been solely partially addressed within the preliminary July 2025 Safety Replace. 

The vulnerabilities allow attackers to realize distant code execution and doubtlessly compromise complete SharePoint environments.

Safety researchers have recognized that profitable exploitation leads to the creation of malicious recordsdata resembling spinstall0.aspx, which serves as an indicator of compromise. 

The assault vectors contain subtle strategies that bypass conventional safety controls, making quick patching crucial for organizational safety.

CVETitleAffected ProductsSeverityCVE-2025-53770CVE-2025-53771SharePoint Server Distant Code Execution VulnerabilitySharePoint Server 2016, 2019, Subscription EditionCritical

Safety Updates

Microsoft has launched complete safety updates to deal with these vulnerabilities. For SharePoint Server Subscription Version, organizations should apply safety replace KB5002768, whereas SharePoint Server 2019 requires KB5002754. 

SharePoint 2016 updates are nonetheless in improvement, leaving these techniques quickly weak.

The corporate recommends implementing a number of defensive layers instantly. Organizations should allow the Antimalware Scan Interface (AMSI) in Full Mode, which supplies crucial safety in opposition to unauthenticated assaults. 

Moreover, deploying Microsoft Defender Antivirus on all SharePoint servers creates a vital safety barrier.

An important post-patching step includes rotating SharePoint Server ASP.NET machine keys utilizing both the Replace-SPMachineKey PowerShell cmdlet or the Central Administration interface. 

After key rotation, directors should restart IIS utilizing iisreset.exe on all SharePoint servers to finish the remediation course of.

Microsoft has deployed a number of detection mechanisms by way of its safety ecosystem. Microsoft Defender Antivirus now identifies threats below detection names Exploit:Script/SuspSignoutReq.A and Trojan:Win32/HijackSharePointServer.A. 

These signatures present real-time safety in opposition to identified exploitation makes an attempt.

Microsoft Defender for Endpoint generates particular alerts, together with “Attainable net shell set up,” “Suspicious IIS employee course of conduct,” and “SuspSignoutReq malware was blocked on a SharePoint server”. 

Safety groups can leverage superior searching queries to establish potential compromise indicators throughout their setting.

Organizations can make the most of Microsoft Defender Vulnerability Administration to evaluate publicity ranges by filtering for the precise CVE identifiers within the Software program vulnerabilities part. 

The unified superior searching question DeviceTvmSoftwareVulnerabilities | the place CveId in (“CVE-2025-49706″,”CVE-2025-53770”) permits complete vulnerability monitoring throughout enterprise environments.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:0Day, Critical, Emergency, Microsoft, Patch, Released, Security, SharePoint, Update, Vulnerability

Post navigation

Previous Post: New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator
Next Post: Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Related Posts

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News
Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth Cyber Security News
Attacker Context and Historical iOS Zero-Click Similarities Cyber Security News
CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks Cyber Security News
Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • Users Report Teams and Access Issues
  • Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
  • Users Report Teams and Access Issues
  • Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges
  • UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare
  • Adobe Patches Nearly 140 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark