Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability

Posted on July 21, 2025July 21, 2025 By CWS

Microsoft has issued an pressing safety advisory addressing crucial zero-day vulnerabilities in on-premises SharePoint Server that attackers are actively exploiting. 

The vulnerabilities, assigned as CVE-2025-53770 and CVE-2025-53771, pose quick dangers to organizations working SharePoint infrastructure and require quick remediation.

Key Takeaways1. Lively zero-day assaults focusing on on-premises SharePoint servers by way of CVE-2025-53770 and CVE-2025-53771.2. Apply safety updates instantly: KB5002768 (Subscription Version) or KB5002754 (SharePoint 2019).3. Microsoft Defender is deployed with menace detection and searching capabilities.

Zero-Day Vulnerabilities Underneath Lively Exploitation

The safety flaws particularly goal on-premises SharePoint Server installations, whereas SharePoint On-line in Microsoft 365 stays unaffected. 

Microsoft’s Safety Response Middle confirmed that menace actors are actively exploiting these vulnerabilities, which had been solely partially addressed within the preliminary July 2025 Safety Replace. 

The vulnerabilities allow attackers to realize distant code execution and doubtlessly compromise complete SharePoint environments.

Safety researchers have recognized that profitable exploitation leads to the creation of malicious recordsdata resembling spinstall0.aspx, which serves as an indicator of compromise. 

The assault vectors contain subtle strategies that bypass conventional safety controls, making quick patching crucial for organizational safety.

CVETitleAffected ProductsSeverityCVE-2025-53770CVE-2025-53771SharePoint Server Distant Code Execution VulnerabilitySharePoint Server 2016, 2019, Subscription EditionCritical

Safety Updates

Microsoft has launched complete safety updates to deal with these vulnerabilities. For SharePoint Server Subscription Version, organizations should apply safety replace KB5002768, whereas SharePoint Server 2019 requires KB5002754. 

SharePoint 2016 updates are nonetheless in improvement, leaving these techniques quickly weak.

The corporate recommends implementing a number of defensive layers instantly. Organizations should allow the Antimalware Scan Interface (AMSI) in Full Mode, which supplies crucial safety in opposition to unauthenticated assaults. 

Moreover, deploying Microsoft Defender Antivirus on all SharePoint servers creates a vital safety barrier.

An important post-patching step includes rotating SharePoint Server ASP.NET machine keys utilizing both the Replace-SPMachineKey PowerShell cmdlet or the Central Administration interface. 

After key rotation, directors should restart IIS utilizing iisreset.exe on all SharePoint servers to finish the remediation course of.

Microsoft has deployed a number of detection mechanisms by way of its safety ecosystem. Microsoft Defender Antivirus now identifies threats below detection names Exploit:Script/SuspSignoutReq.A and Trojan:Win32/HijackSharePointServer.A. 

These signatures present real-time safety in opposition to identified exploitation makes an attempt.

Microsoft Defender for Endpoint generates particular alerts, together with “Attainable net shell set up,” “Suspicious IIS employee course of conduct,” and “SuspSignoutReq malware was blocked on a SharePoint server”. 

Safety groups can leverage superior searching queries to establish potential compromise indicators throughout their setting.

Organizations can make the most of Microsoft Defender Vulnerability Administration to evaluate publicity ranges by filtering for the precise CVE identifiers within the Software program vulnerabilities part. 

The unified superior searching question DeviceTvmSoftwareVulnerabilities | the place CveId in (“CVE-2025-49706″,”CVE-2025-53770”) permits complete vulnerability monitoring throughout enterprise environments.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:0Day, Critical, Emergency, Microsoft, Patch, Released, Security, SharePoint, Update, Vulnerability

Post navigation

Previous Post: New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator
Next Post: Exploited CrushFTP Zero-Day Provides Admin Access to Servers

Related Posts

SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network Cyber Security News
Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Cyber Security News
DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads Cyber Security News
Securing Generative AI – Mitigating Data Leakage Risks Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News