Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

Posted on July 23, 2025July 23, 2025 By CWS

Jul 23, 2025Ravie LakshmananVulnerability / Risk Intelligence
The U.S. Cybersecurity and Infrastructure Safety Company (CISA), on July 22, 2025, added two Microsoft SharePoint flaws, CVE-2025-49704 and CVE-2025-49706, to its Identified Exploited Vulnerabilities (KEV) catalog, based mostly on proof of energetic exploitation.
To that finish, Federal Civilian Government Department (FCEB) businesses are required to remediate recognized vulnerabilities by July 23, 2025.
“CISA is conscious of energetic exploitation of a spoofing and RCE vulnerability chain involving CVE-2025-49706 and CVE-2025-49704, enabling unauthorized entry to on-premise SharePoint servers,” the company stated in an up to date advisory.

The inclusion of the 2 shortcomings, a spoofing vulnerability and a distant code execution vulnerability collectively tracked as ToolShell, to the KEV catalog comes after Microsoft revealed that Chinese language hacking teams like Linen Storm and Violet Storm leveraged these flaws to breach on-premises SharePoint servers since July 7, 2025.
As of writing, the tech big’s personal advisories solely listing CVE-2025-53770 as being exploited within the wild. What’s extra, it describes the 4 flaws as under –

CVE-2025-49704 – SharePoint Distant Code Execution
CVE-2025-49706 – SharePoint Put up-auth Distant Code Execution
CVE-2025-53770 – SharePoint ToolShell Authentication Bypass and Distant Code Execution
CVE-2025-53771 – SharePoint ToolShell Path Traversal

The truth that CVE-2025-53770 is each an authentication bypass and a distant code execution bug signifies that CVE-2025-53771 shouldn’t be crucial to construct the exploit chain. CVE-2025-53770 and CVE-2025-53771 are assessed to be patch bypasses for CVE-2025-49704 and CVE-2025-49706, respectively.
“The basis trigger [of CVE-2025-53770] is a mix of two bugs: An authentication bypass (CVE-2025-49706) and an insecure deserialization vulnerability (CVE-2025-49704),” the Akamai Safety Intelligence Group stated.
When reached for remark concerning the exploitation standing of CVE-2025-53771 and different flaws, a Microsoft spokesperson instructed The Hacker Information that the data revealed in its advisories is appropriate “on the time of authentic publication” and that it doesn’t usually replace post-release.
“Microsoft additionally assists CISA with the Identified Exploited Vulnerabilities Catalog which gives commonly up to date data on exploited vulnerabilities,” the spokesperson added.

The event comes as watchTowr Labs instructed the publication that it has internally devised a technique exploiting CVE-2025-53770 such that it bypasses Antimalware Scan Interface (AMSI), a mitigation step outlined by Microsoft to stop unauthenticated assaults.
“This has allowed us to proceed figuring out susceptible techniques even after mitigations like AMSI have been utilized,” watchTowr CEO Benjamin Harris stated. “AMSI was by no means a silver bullet, and this final result was inevitable. However we’re involved to listen to that some organizations are selecting to ‘allow AMSI’ as a substitute of patching. It is a very dangerous thought.”
“Now that exploitation has been linked to nation-state actors, it might be naive to suppose they might leverage a SharePoint zero-day however by some means not bypass AMSI. Organizations should patch. Ought to go with out saying – all the general public PoCs will set off AMSI, and mislead organizations into believing the mitigations are complete/the host is now not susceptible. This might be incorrect.”

The Hacker News Tags:Attacks, Chinese, CISA, Exploit, Flaws, Hackers, Live, Orders, Patching, SharePoint, Urgent

Post navigation

Previous Post: Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code
Next Post: Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Vulnerability in the Wild

Related Posts

Microsoft Removes Password Management from Authenticator App Starting August 2025 Microsoft Removes Password Management from Authenticator App Starting August 2025 The Hacker News
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks The Hacker News
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation The Hacker News
Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News