Microsoft Issues Critical Patch for SharePoint RCE Vulnerability Targeted in Ongoing Cyber Attacks

July 21, 2025
Server Security / Vulnerability

On Sunday, Microsoft released vital security updates to address an actively exploited vulnerability in SharePoint and provided details on another flaw that now has “more robust protections.” The company acknowledged it is “aware of active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update.” The exploited vulnerability, tracked as CVE-2025-53770 (CVSS score: 9.8), involves remote code execution due to the deserialization of untrusted data in on-premises versions of Microsoft SharePoint Server. The newly identified issue is a spoofing vulnerability (CVE-2025-53771, CVSS score: 7.1), discovered and reported by Viettel Cyber Security and an anonymous researcher. The flaw is linked to inadequate restrictions on pathnames, leading to potential path traversal in Microsoft Office SharePoint…

Microsoft Issues Urgent Security Patch for Critical SharePoint Vulnerability Amid Ongoing Cyber Attacks

On July 21, 2025, Microsoft released critical security updates aimed at addressing a serious vulnerability in SharePoint that is currently being exploited in ongoing cyber attacks targeting on-premises customers. The company revealed that it is aware of these active threats, stating that attackers are utilizing vulnerabilities only partially mitigated by the July Security Update. This vulnerability, tracked as CVE-2025-53770, has been assigned a high CVSS score of 9.8, indicating its severity and potential impact. It pertains to a remote code execution flaw linked to the deserialization of untrusted data in on-premises Microsoft SharePoint Server versions.

In addition to this urgent patch, Microsoft disclosed details about another vulnerability, CVE-2025-53771, which is categorized as a spoofing flaw with a CVSS score of 7.1. This particular shortcoming was uncovered through the collaborative efforts of Viettel Cyber Security alongside an anonymous researcher. The reported issue involves an improper limitation of a pathname, commonly referred to as ‘path traversal,’ which could enable malicious actors to gain unauthorized access to restricted directories within Microsoft Office SharePoint.

The primary targets of this ongoing campaign are organizations that rely on on-premises installations of Microsoft SharePoint Server, highlighting a critical exposure for enterprises that manage their own server environments. This incident raises significant cybersecurity concerns, especially given the increasing sophistication of cyber adversaries navigating through existing vulnerabilities.

The global landscape of cyber threats continues to evolve, with attackers employing a variety of tactics that align with the MITRE ATT&CK framework. In this case, the initial access likely employed techniques such as exploiting known vulnerabilities to penetrate system defenses. Once inside, adversaries may employ tactics for persistence and privilege escalation, enabling them to maintain access and control over compromised systems.

Business owners should take this information seriously as the implications of unpatched vulnerabilities can lead to significant security breaches, potentially compromising sensitive data. Regularly updating software and following best practices for cybersecurity are essential steps in mitigating risks related to such vulnerabilities.

As Microsoft continues to monitor the situation and implement robust protections, businesses utilizing SharePoint should act swiftly to apply these updates and bolster their security measures. Furthermore, staying informed of available patches and understanding the potential tactics employed by adversaries can greatly enhance an organization’s defense against cyber threats.

Source link