Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

Posted on July 20, 2025July 20, 2025 By CWS

Jul 20, 2025Ravie LakshmananZero-Day / Vulnerability
A vital safety vulnerability in Microsoft SharePoint Server has been weaponized as a part of an “energetic, large-scale” exploitation marketing campaign.
The zero-day flaw, tracked as CVE-2025-53770 (CVSS rating: 9.8), has been described as a variant of CVE-2025-49706 (CVSS rating: 6.3), a spoofing bug in Microsoft SharePoint Server that was addressed by the tech large as a part of its July 2025 Patch Tuesday updates.
“Deserialization of untrusted knowledge in on-premises Microsoft SharePoint Server permits an unauthorized attacker to execute code over a community,” Microsoft mentioned in an advisory launched on July 19, 2025.
The Home windows maker additional famous that it is making ready and totally testing a complete replace to resolve the problem. It credited Viettel Cyber Safety for locating and reporting the flaw via Pattern Micro’s Zero Day Initiative (ZDI).

In a separate alert issued Saturday, Redmond mentioned it is conscious of energetic assaults focusing on on-premises SharePoint Server clients, however emphasised that SharePoint On-line in Microsoft 365 just isn’t impacted.
Within the absence of an official patch, Microsoft is urging clients to configure Antimalware Scan Interface (AMSI) integration in SharePoint and deploy Defender AV on all SharePoint servers.
It is price noting that AMSI integration is enabled by default within the September 2023 safety replace for SharePoint Server 2016/2019 and the Model 23H2 characteristic replace for SharePoint Server Subscription Version.
For many who can’t allow AMSI, it is suggested that the SharePoint Server is disconnected from the web till a safety replace is obtainable. For added safety, customers are really helpful to deploy Defender for Endpoint to detect and block post-exploit exercise.
The disclosure comes as Eye Safety and Palo Alto Networks Unit 42 warned of assaults chaining CVE-2025-49706 and CVE-2025-49704 (CVSS rating: 8.8), a code injection flaw in SharePoint, to facilitate arbitrary command execution on prone cases. The exploit chain has been codenamed ToolShell.
However on condition that CVE-2025-53770 is a “variant” of CVE-2025-49706, it is suspected that these assaults are associated.

The malicious exercise basically entails delivering ASPX payloads by way of PowerShell, which is then used to steal the SharePoint server’s MachineKey configuration, together with the ValidationKey and DecryptionKey, to take care of persistent entry.
The Dutch cybersecurity firm mentioned these keys are essential for producing legitimate __VIEWSTATE payloads, and that getting access to them successfully turns any authenticated SharePoint request right into a distant code execution alternative.

“We’re nonetheless figuring out mass exploit waves,” Eye Safety CTO Piet Kerkhofs informed The Hacker Information in an announcement. “It will have a huge effect as adversaries are laterally shifting utilizing this distant code execution with pace.”
“We notified nearly 75 organisations that bought breached, as we recognized the malicious net shell on their SharePoint servers. On this group are large firms and enormous authorities our bodies the world over.”
It is price noting that Microsoft has but to replace its advisories for CVE-2025-49706 and CVE-2025-49704 to mirror energetic exploitation. We’ve got additionally reached out to the corporate for additional clarification, and we’ll replace the story if we hear again.
(The story is creating. Please verify again for extra particulars.)

The Hacker News Tags:Actively, Breaches, Critical, Exploited, Global, Organizations, SharePoint, Unpatched, ZeroDay

Post navigation

Previous Post: Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
Next Post: SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available

Related Posts

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale The Hacker News
Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks The Hacker News
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate The Hacker News
A New Maturity Model for Browser Security: Closing the Last-Mile Risk The Hacker News
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News