BigTech CompaniesCybersecurityNewswireSecurityWhat's Buzzing

Microsoft Warns of Active Attacks on On-Prem SharePoint Servers

Get Hired 3x Faster with AI- Powered CVs CV Assistant single post Ad
▼ Summary

Microsoft warns of active exploitation of SharePoint vulnerabilities, targeting critical sectors like government and healthcare, with high risk to on-premises servers.
– Attackers are installing web shells and stealing cryptographic secrets, bypassing identity controls like MFA and SSO to gain privileged access.
– Two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) are being exploited, with one rated critical (CVSS 9.8) allowing remote code execution.
– Microsoft advises immediate action, including patching, rotating cryptographic material, and disconnecting SharePoint from the internet if necessary.
– Partial fixes are available for SharePoint Subscription Edition and SharePoint 2019, but no patches yet exist for SharePoint 2016, with an emergency update expected.

Microsoft has issued a clear warning: active cyberattacks are hitting on-premises SharePoint servers, putting sensitive data in government, healthcare, and large corporate networks directly in harm’s way. Threat groups are taking advantage of unpatched vulnerabilities, dropping malicious web shells, and stealing cryptographic keys that help them slip past normal defenses.

Investigators have seen attackers bypass multi-factor authentication (MFA) and single sign-on (SSO) safeguards, grabbing privileged access to entire SharePoint environments. Once inside, they don’t stop, these intrusions lead to persistent access, data exfiltration, and wider compromise of connected Microsoft services like Teams, Outlook, and OneDrive.

At the heart of this spike: two major security flaws. One in particular, CVE-2025-53770 (CVSS 9.8), opens the door for remote code execution, letting unauthorized users run malicious commands over a network. Microsoft has pushed out patches for SharePoint Subscription Edition and SharePoint 2019, but SharePoint 2016 remains without a fix, leaving countless setups wide open.

Security experts are urging IT teams to assume breach if servers are internet-facing. The attackers’ methods are unusually advanced, using stolen cryptographic keys to forge authentication tokens that can keep them in the system even after updates are rolled out. Researchers point to compromised MachineKeys, which protect SharePoint’s VIEWSTATE, as the weak link that lets attackers skip security checks and execute code out of sight.

Dutch firm Eye Security says two separate waves have hit so far, with dozens of systems compromised in just 24 hours. Meanwhile, Palo Alto Networks’ Unit 42 warns that one SharePoint breach can easily become a full network takeover, setting off a domino effect across a company’s infrastructure.

While Microsoft races to patch SharePoint 2016, security teams are being told to dig into incident response now to catch intrusions that might already be lurking unnoticed. Companies running only SharePoint Online in the cloud can breathe easier, these attacks target on-premises deployments, once again underlining their unique exposure.

(Source: Info Security)

Topics

sharepoint vulnerabilities 95% immediate patching mitigation 95% cve-2025-53770 cve-2025-53771 90% critical sectors at risk 90% remote code execution 85% web shells cryptographic theft 85% bypassing mfa sso 80% sophisticated attacker tactics 80% incident response priority 80% active exploitation reports 75%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!