Sunday, January 11, 2026

Critical SharePoint flaw exploited worldwide

- Advertisement -

SharePoint vulnerability: Global impact

critical zero-day SharePoint vulnerability is being actively exploited in a widespread cyberattack. Over 85 servers across at least 54 organizations—including government bodies and multinational corporations—have been compromised worldwide. The flaw, CVE-2025-53770, allows remote code execution without authentication and currently has no available patch.

SharePoint vulnerability triggers government response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-53770 to its Known Exploited Vulnerabilities catalog, requiring federal agencies to act by Monday. CISA’s Acting Executive Assistant Director Chris Butera stated, “CISA was made aware of the exploitation by a trusted partner and we reached out to Microsoft immediately.”
Eye Security revealed that victims include multiple governments and banks in the US, Germany, France, and Australia. CTO Piet Kerkhofs reported, “We are still identifying mass exploit waves.”

SharePoint vulnerability: Technical details

Dubbed “ToolShell,” the flaw relates to insecure deserialization in on-premises SharePoint Server. Attackers install web shells and steal cryptographic keys, letting them maintain access even after patches are deployed. The stolen keys can forge authentication tokens for lateral movement.

Microsoft patches and mitigations for SharePoint vulnerability

Microsoft recommends enabling Antimalware Scan Interface (AMSI) and deploying Defender Antivirus on all SharePoint servers. For those unable to use AMSI, disconnecting affected servers from the internet is advised.
SharePoint Online in Microsoft 365 is not affected by this vulnerability.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

1,468FansLike
141FollowersFollow
440FollowersFollow
226SubscribersSubscribe
- Advertisement -

Latest Articles