PT-2025-28603 · Microsoft · Sharepoint Server
Published
2025-07-08
·
Updated
2025-09-05
·
CVE-2025-49706
7.5
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:P/A:N |
**Name of the Vulnerable Software and Affected Versions:**
Microsoft SharePoint Server, Microsoft SharePoint Server Subscription Edition, Microsoft Office SharePoint (affected versions not specified)
**Description:**
An improper authentication vulnerability exists in Microsoft SharePoint, allowing an unauthorized attacker to perform spoofing over a network. Exploitation of this issue can allow an attacker to view sensitive information and make changes to disclosed information. Multiple China-based groups, including Linen Typhoon, Violet Typhoon, and Storm-2603, are actively exploiting this vulnerability, along with others (CVE-2025-49704, CVE-2025-53770, CVE-2025-53771), to target global government, military, and corporate sectors. The exploitation involves a technique called "ToolShell," which chains multiple vulnerabilities to bypass authentication, drop a web shell, extract cryptographic keys, and execute arbitrary commands. The "ToolShell" campaign has compromised over 85 servers as of July 20, 2025, and over 400 organizations globally, including US agencies. The vulnerability is related to a logic flaw in SharePoint’s authentication checks, where a crafted `Referrer` header matching a sign-out page can bypass security.
**Recommendations:**
Apply the latest security updates released by Microsoft.
Isolate any unpatched SharePoint servers.
Rotate Machine Keys to mitigate potential persistence after exploitation.
Scan systems for Indicators of Compromise (IOCs) related to this vulnerability.
Consider temporarily disabling the vulnerable component `ToolPane.aspx` as a workaround.
Fix
RCE
Improper Authentication
Weakness Enumeration
Related Identifiers
Affected Products
References · 206
- https://bdu.fstec.ru/vul/2025-08524 · Security Note
- https://microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49706 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-49706 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-580 · Security Note
- https://twitter.com/gothburz/status/1947165167319425378 · Twitter Post
- https://t.me/aptreports/20964 · Telegram Post
- https://twitter.com/IntCyberDigest/status/1946625544713347276 · Twitter Post
- https://twitter.com/johnspectator/status/1947056192057921932 · Twitter Post
- https://t.me/pentestingnews/64978 · Telegram Post
- https://twitter.com/AfricaCERT/status/1953009925262573902 · Twitter Post
- https://reddit.com/r/CyberSecurity_NL/comments/1m5lkqc/security_updates_sharepoint_netscaler_en_cisco_ise · Reddit Post
- https://reddit.com/r/PrivatePackets/comments/1m68u2f/the_toolshell_zeroday_how_a_botched_patch_led_to · Reddit Post
- https://twitter.com/f1tym1/status/1947666532156243973 · Twitter Post