Source: BleepingComputer
Author: Lawrence Abrams
URL: https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/
ONE SENTENCE SUMMARY:
A zero-day vulnerability in Microsoft SharePoint, CVE-2025-53770, has led to widespread exploitation, with ongoing efforts to mitigate and patch the issue.
MAIN POINTS:
- Updated article reveals 54 organizations affected by SharePoint vulnerability.
- CVE-2025-53770 has been exploited since July 18, affecting 85 servers.
- Viettel’s “ToolShell” attack used chained SharePoint flaws CVE-2025-49706/49704.
- Microsoft has not yet patched CVE-2025-53770; AMSI integration is recommended.
- Enabling AMSI and Defender AV as mitigations prevent unauthenticated attacks.
- SharePoint 2016/2019 updates include AMSI by default since September 2023.
- Disconnect unprotected SharePoint servers to prevent exploitation.
- CISA added CVE-2025-53770 to its Known Exploited Vulnerability catalog.
- Over 29 organizations initially compromised, detected by Eye Security.
- Attackers use “spinstall0.aspx” for MachineKey theft and RCE.
TAKEAWAYS:
- Prompt application of upcoming SharePoint security patches is crucial.
- Enabling AMSI and deploying Defender AV mitigates vulnerability risks.
- Detecting specific IOCs can indicate compromised SharePoint servers.
- Disconnect from the internet if unable to apply mitigations swiftly.
- Monitoring for IP addresses associated with exploitation is essential.