PT-2025-30160 · Microsoft · Sharepoint Server
Published
2025-07-19
·
Updated
2025-08-26
·
CVE-2025-53770
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
## Vulnerability Summary
**Name of the Vulnerable Software and Affected Versions:** Microsoft SharePoint Server (affected versions not specified)
**Description:**
A critical zero-day remote code execution (RCE) vulnerability (CVE-2025-53770, also known as “ToolShell”) exists in on-premises Microsoft SharePoint Server. This vulnerability allows unauthenticated attackers to execute arbitrary code, potentially leading to full system compromise, data theft, and the installation of backdoors. The vulnerability stems from a deserialization flaw. Active exploitation has been observed globally, with over 100 organizations reportedly compromised, including government agencies and critical infrastructure providers. Attackers are leveraging this vulnerability to steal cryptographic keys and maintain persistent access. While a patch has been released for some versions, the vulnerability remains a significant threat, particularly for unpatched systems.
**Recommendations:**
* Apply the latest security updates released by Microsoft for SharePoint Server.
* Implement the mitigation strategies provided by Microsoft and CISA.
* Monitor systems for indicators of compromise (IOCs) related to the ToolShell exploit.
* Consider isolating vulnerable systems if patching is not immediately feasible.
* Enable AMSI and ensure EDR visibility.
* Enforce multi-factor authentication (MFA).
* Rotate cryptographic keys.
* Review and audit SharePoint configurations for potential vulnerabilities.
Exploit
Fix
LPE
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 1123
- 🔥 https://github.com/soltanali0/CVE-2025-53770-Exploit⭐ 26 🔗 3 · Exploit
- 🔥 https://github.com/kaizensecurity/CVE-2025-53770⭐ 9 🔗 7 · Exploit
- 🔥 https://research.eye.security/sharepoint-under-siege · Exploit
- 🔥 https://arstechnica.com/security/2025/07/sharepoint-vulnerability-with-9-8-severity-rating-is-under-exploit-across-the-globe · Exploit
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770 · Vendor Advisory
- https://zerodayinitiative.com/advisories/ZDI-25-653 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-53770 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/723277 · Security Note
- https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-08714 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53770 · Security Note
- https://github.com/n1chr0x/Zeropoint 🔗 1 · Note
- https://twitter.com/ExtraHop/status/1958555761987948706 · Twitter Post
- https://reddit.com/r/crowdstrike/comments/1m4xhjh/crowdstrike_and_sharepoint_toolshell_cves · Reddit Post
- https://t.me/aptreports/20652 · Telegram Post