• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Warns of Critical SharePoint Zero-day Vulnerability

Paul Balo by Paul Balo
July 21, 2025
in Security
Share on FacebookShare on Twitter

Microsoft is racing to contain a fast‑moving zero‑day campaign against on‑premises SharePoint Server after researchers uncovered a flaw now tracked as CVE‑2025‑53770 and nicknamed “ToolShell.” The vulnerability, rated CVSS 9.8, stems from unsafe deserialization in SharePoint’s ASP.NET framework and lets an unauthenticated attacker run arbitrary code over the network; once inside, the threat actor plants a lightweight web‑shell (ToolShell) that opens full command execution, credential dumping and lateral‑movement pathways .

Exploitation began in mid‑July and has already breached more than 75 organisations worldwide, including financial‑services firms, defence contractors and two European universities, according to telemetry shared with SecurityWeek and The Hacker News. Eye Security’s internet scans show dozens of compromised servers beaconing to a cluster of IPs in Russia and Vietnam, suggesting the campaign is both automated and opportunistic. SharePoint Online in Microsoft 365 is unaffected; the danger is confined to self‑hosted SharePoint 2016, 2019 and Subscription Edition.

When Microsoft issued its July Patch Tuesday bundle, researchers quickly proved that CVE‑2025‑49706 (fixed that day) could be bypassed; ToolShell is that bypass. Microsoft has since shipped out‑of‑band fixes for SharePoint Subscription Edition and SharePoint 2019, but SharePoint 2016 remains unpatched while engineers “finish validation.” The company’s guidance urges admins to:

  • install July 2025 security updates (where available);
  • enable AMSI scanning and Defender for Endpoint;
  • rotate ASP.NET machine keys;
  • block or closely monitor strange requests to /_layouts/15/.aspx resources, which attackers exploit for payload delivery .

Because a universal patch is not ready, Microsoft and CISA instruct organisations to remove vulnerable servers from the public internet or apply a PowerShell script that disables remote procedure calls to vulnerable endpoints and enforces strict request filtering. CISA has added CVE‑2025‑53770 to its Known Exploited Vulnerabilities catalogue, giving U.S. federal agencies 48 hours to apply mitigations or disconnect affected servers.

 

Anatomy of the attack

  1. Initial access: the attacker sends a crafted SOAP request that triggers unsafe deserialization, achieving code execution as the SharePoint service account.
  2. Payload drop: a small ASPX file (“ToolShell.aspx”) lands in /_layouts/15 and phones home.
  3. Privilege escalation: system tokens are stolen; attackers scour the server for web.config files containing passwords.
  4. Lateral movement & data theft: encrypted secrets are exfiltrated; some victims saw outbound traffic to Teams and OneDrive APIs, indicating wider M365 abuse .

Indicators of compromise published by SOCRadar include SHA‑256 hashes of the web‑shell, malicious user‑agent strings (“toolshell‑loader/1.3”) and command‑and‑control ranges 94.103.9[.]0/24 and 193.23.181[.]0/24 . Detect‑hunters should also look for scheduled tasks invoking mshta.exe, powershell -enc blobs and unusual IIS worker‑process spawns.

 

What to do now

  • Patch if you can: Subscription Edition and 2019 admins should apply Microsoft’s out‑of‑band updates immediately.
  • Mitigate if you can’t: 2016 shops must implement Microsoft’s PowerShell hardening script, enable AMSI, and block internet exposure until a fix ships.
  • Hunt aggressively: query server logs for the ToolShell IOC set, review outbound traffic for odd DNS or HTTP destinations, and rotate all credentials stored inside SharePoint.
  • Prepare for follow‑on attacks: ToolShell backdoors have been used to deploy Cobalt Strike, Bughatch and ransomware loaders within hours of initial compromise.

 

With proof‑of‑concept exploits circulating in Telegram channels and GitHub gists, defenders have little time to spare. Until Microsoft finalises the SharePoint 2016 patch, the safest posture is “isolate, harden and hunt.” As CISA’s weekend alert warns, leaving an unpatched SharePoint server online today is “the digital equivalent of posting admin passwords on your website.” 

Related Posts:

  • 4025691-0-97050800-1753099410-original
    Microsoft Patches SharePoint Bug, Leaves 2016…
  • microsoft-sharepoint-104_v-variantBig1x1_w-1280_zc-3061602c
    SharePoint Zero-day Persists Despite Microsoft Patches
  • 5cdb1bc21ea851eb0c74bf693121f711
    Chinese Hackers Exploiting SharePoint Zero-day - Microsoft
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • Cloudflare-AI_Bot-Blocking
    Cloudflare Blames React2Shell Protections for Outage
  • shutterstock_chatgpt
    Researchers Warn ChatGPT Crawler May Cause DDoS…
  • 020tYFWBL4Yz8jIIFUdKDR1-22
    A Fix to Microsoft Windows Defender And Security Flaws
  • microsofts-surface-duo-dualscreen-androi-5f1f3d057e8c350ae07dd862-1-jul-28-2020-15-24-20-poster
    Microsoft Patch Tuesday Fixes 63 Bugs, 1 Zero-Day

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: CVE‑2025‑53770microsoft sharepointsecuritysharepointSharePoint Zero-day Vulnerabilitytoolshell
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Meta Acquires Robotics Startup To Boost & Improve Its Humanoid AI Efforts May 2, 2026
  • xAI Rolls out Grok 4.3 and a New Voice Cloning Suite May 2, 2026
  • Pentagon Taps Nvidia, Microsoft And AWS To Bring AI To Classified Networks May 1, 2026
  • Hackers Are Exploiting Critical cPanel Bug, Putting Millions of Websites at Risk May 1, 2026
  • Alibaba’s Metis Agent Aims to Fix ‘Trigger‑Happy’ AI Tool Use With New RL Framework May 1, 2026
  • Samsung Q1 2026 Earnings: Record Profit Driven by AI Memory Chip Boom May 1, 2026
  • Qualcomm Q1 2026 Earnings: China Weakness and AI Push Drive Mixed Results May 1, 2026
  • Amazon Q1 2026 Earnings: AWS and AI Drive Strong Growth Despite Spending Concerns May 1, 2026
  • Meta Q1 2026 Earnings: Strong Revenue Growth Overshadowed by Massive AI Spending May 1, 2026
  • Apple Q2 2026 Earnings: $111B Revenue, iPhone 17 Drives Record Growth May 1, 2026
  • IBM Rolls out ‘Bob’, an AI Development Partner Built around Multi-model Routing and Human Checkpoints April 29, 2026
  • iOS 27 Reportedly Adds New Apple Intelligence Photo Editing Tools April 29, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

Chat with TechBooky AI
💬
TechBooky AI ✕
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.