Urgent CISA Alert: Active Microsoft SharePoint Exploit

▼ Summary
– CVE-2026-20963 is a critical remote code execution vulnerability in multiple Microsoft SharePoint Server versions that is now being actively exploited.
– The flaw, caused by deserialization of untrusted data, allows unauthenticated attackers to execute code remotely without requiring any user interaction.
– The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities catalog, mandating federal agencies to patch it by March 21, 2026.
– Microsoft initially assessed the vulnerability as “less likely” to be exploited but had already released a fix and urged organizations to upgrade promptly.
– SharePoint servers are a frequent target for attackers due to the valuable corporate data they hold and their potential as a gateway into broader network environments.
A critical security flaw in Microsoft SharePoint, previously patched but now confirmed as actively exploited, demands immediate attention from organizations worldwide. The Cybersecurity and Infrastructure Security Agency (CISA) has officially added this vulnerability, tracked as CVE-2026-20963, to its Known Exploited Vulnerabilities catalog, signaling that attackers are actively using it in the wild. This designation compels federal agencies to apply the available security updates by a strict deadline, and private sector entities are strongly advised to follow suit without delay.
This remote code execution vulnerability impacts multiple versions of the widely used collaboration platform, including Microsoft SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Enterprise Server 2016. The issue stems from the deserialization of untrusted data. Microsoft’s advisory clarifies that an unauthenticated attacker, operating over a network, could craft a malicious payload to inject and run arbitrary code on a vulnerable SharePoint server. Alarmingly, this attack requires no interaction from a user, making it a potent threat for automated exploitation.
When Microsoft initially released the patch in January 2026, the company assessed the likelihood of exploitation as “less likely.” However, the situation has evolved significantly. CISA’s action is based on verified intelligence of active attacks, though the agency typically does not disclose specific details about the ongoing exploitation campaigns. Microsoft has not yet updated its own advisory to reflect the active attacks, but CISA’s move serves as a definitive warning.
The urgency to patch cannot be overstated. SharePoint servers frequently house sensitive corporate information and intellectual property, and a successful breach can provide attackers with a foothold to pivot deeper into an organization’s network. Given this elevated risk profile, vulnerabilities in SharePoint are a prime target for cybercriminals and state-sponsored actors alike. Federal agencies have been directed to secure their systems by March 21, 2026. All other organizations running affected SharePoint versions should treat this with equal priority, verifying that the January 2026 security updates have been comprehensively applied to close this dangerous security gap.
(Source: Help Net Security)




