• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Patches SharePoint Bug, Leaves 2016 Servers Exposed

Paul Balo by Paul Balo
July 21, 2025
in Security
Share on FacebookShare on Twitter

Microsoft has moved fast to blunt an active exploitation wave targeting on‑premises SharePoint Server, rolling out out‑of‑band fixes for two freshly numbered zero‑days—CVE‑2025‑53770 and the closely related CVE‑2025‑53771—that attackers have been using since mid‑July to hijack corporate portals and plant a web‑shell dubbed ToolShell. The company released security updates late on 19 July for SharePoint Server Subscription Edition (KB 5002768) and SharePoint 2019 (KB 5002754), but confirmed that SharePoint 2016 remains unpatched while the update “finishes validation.”

ToolShell abuses an unsafe‑deserialisation flaw inside SharePoint’s ASP.NET workflow engine. An unauthenticated attacker can send one crafted SOAP request to a publicly exposed server and immediately run arbitrary code as the SharePoint service account—no credentials, no multifactor prompts. From there the intruder drops a 9 KB ASPX file (ToolShell.aspx) into /_layouts/15/, giving full command execution, credential dumping and lateral‑movement ability across the Windows domain. Eye Security telemetry shows the technique has already breached at least 75 organisations worldwide, including financial firms, a defence supplier and two European universities.

 

Patch status at a glance

ProductFixed?Security‑update KBNotes
SharePoint Subscription EditionYesKB 5002768Apply immediately, then rotate machine keys
SharePoint Server 2019YesKB 5002754Same guidance as above
SharePoint Server 2016No—Use Microsoft’s mitigation script and, if possible, pull the server off the public internet until the patch ships

Microsoft stresses that SharePoint Online (Microsoft 365) is not affected, and all activity seen to date targets self‑hosted deployments.

Mandatory mitigations for 2016 shops

Until the 2016 fix lands, Redmond and CISA both recommend a three‑step defensive stance:

  1. Run Microsoft’s PowerShell hardening script to disable RPC endpoints exploited by ToolShell and enforce strict request filtering.
  2. Enable AMSI scanning (Defender or equivalent) on every SharePoint server to block malicious requests before they reach IIS.
  3. Rotate ASP.NET machine keys after any security change—and again once the final patch is applied—to invalidate stolen session cookies.

CISA has added CVE‑2025‑53770 to its Known Exploited Vulnerabilities (KEV) catalogue, giving U.S. federal agencies 48 hours to apply the available updates or disconnect vulnerable servers.

How the attack unfolds

Initial access: a single SOAP envelope triggers the deserialization bug.
Payload drop: ToolShell.aspx lands under the LAYOUTS path.
Privilege escalation & spread: the shell dumps LSASS, harvests passwords inside web.config files and spawns encoded PowerShell to fan out across the network.
Post‑exploitation: defenders have observed Cobalt Strike, Bughatch and even ransomware loaders within hours of first compromise.

Hunt teams should look for:

  • newly created ToolShell.aspx, spinstall0.aspx or similarly named files in /_layouts/15 or /_layouts/16;
  • IIS worker processes (w3wp.exe) launching PowerShell ‑enc commands;
  • outbound traffic to C2 ranges 94.103.9[.]0/24 and 193.23.181[.]0/24 or the user‑agent string toolshell‑loader/1.3.

For admins, here’s what to do urgently

  1. Patch today if you run Subscription Edition or 2019; reboot and verify the build numbers.
  2. Deploy Microsoft Defender for Endpoint (or equivalent) and import the new threat signatures (Exploit:Script/SuspSignoutReq.A, Trojan:Win32/HijackSharePointServer.A).
  3. Audit logs for past exploitation going back to 18 July; many victims were breached before patches existed.
  4. Educate IT staff: any externally facing SharePoint server without these fixes is “the digital equivalent of posting admin passwords on your website,” CISA warns.

 

Microsoft says the SharePoint 2016 patch is “days, not weeks” away. Until it ships, isolating the server or enforcing Microsoft’s script is the only safe course. With proof‑of‑concept exploits now circulating on GitHub and Telegram, time is short—and the attackers have a head start. 

Related Posts:

  • microsoft-sharepoint-104_v-variantBig1x1_w-1280_zc-3061602c
    SharePoint Zero-day Persists Despite Microsoft Patches
  • Microsoft SharePoint CTA
    Microsoft Warns of Critical SharePoint Zero-day…
  • 5cdb1bc21ea851eb0c74bf693121f711
    Chinese Hackers Exploiting SharePoint Zero-day - Microsoft
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • win10-new-1152×648
    Microsoft’s $1.50 Windows Update Fee Kicks In July 1
  • powershell-1024×683
    Microsoft Drops PowerShell 2.0 from Windows 11 & Server
  • 10-windows-server-update-management-social
    Microsoft Blames DHCP Issues for Windows Server…
  • 1_8_VsolmlGbZ-OhZN0wEgrw
    Over 46,000 Grafana Instances Vulnerable to Account Takeover

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: microsoftpatchsharepointSharePoint Zero-day Vulnerabilitytoolshell
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Vietnam Climbs to Top 20 in Global Mobile Speeds September 4, 2025
  • It Only Took 15 Years For Instagram to Launch an iPad App September 4, 2025
  • OpenAI To Acquire Statsig For $1.1 billion September 3, 2025
  • Palo Alto Networks Data Leak Exposes Customer Details September 3, 2025
  • Breaking: Google Keeps Chrome, But Judge Orders Search Data Sharing September 2, 2025
  • YouTube Premium Targets Account Sharing, Netflix-Style September 2, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.