• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Warns of Critical SharePoint Zero-day Vulnerability

Paul Balo by Paul Balo
July 21, 2025
in Security
Share on FacebookShare on Twitter

Microsoft is racing to contain a fast‑moving zero‑day campaign against on‑premises SharePoint Server after researchers uncovered a flaw now tracked as CVE‑2025‑53770 and nicknamed “ToolShell.” The vulnerability, rated CVSS 9.8, stems from unsafe deserialization in SharePoint’s ASP.NET framework and lets an unauthenticated attacker run arbitrary code over the network; once inside, the threat actor plants a lightweight web‑shell (ToolShell) that opens full command execution, credential dumping and lateral‑movement pathways .

Exploitation began in mid‑July and has already breached more than 75 organisations worldwide, including financial‑services firms, defence contractors and two European universities, according to telemetry shared with SecurityWeek and The Hacker News. Eye Security’s internet scans show dozens of compromised servers beaconing to a cluster of IPs in Russia and Vietnam, suggesting the campaign is both automated and opportunistic. SharePoint Online in Microsoft 365 is unaffected; the danger is confined to self‑hosted SharePoint 2016, 2019 and Subscription Edition.

When Microsoft issued its July Patch Tuesday bundle, researchers quickly proved that CVE‑2025‑49706 (fixed that day) could be bypassed; ToolShell is that bypass. Microsoft has since shipped out‑of‑band fixes for SharePoint Subscription Edition and SharePoint 2019, but SharePoint 2016 remains unpatched while engineers “finish validation.” The company’s guidance urges admins to:

  • install July 2025 security updates (where available);
  • enable AMSI scanning and Defender for Endpoint;
  • rotate ASP.NET machine keys;
  • block or closely monitor strange requests to /_layouts/15/.aspx resources, which attackers exploit for payload delivery .

Because a universal patch is not ready, Microsoft and CISA instruct organisations to remove vulnerable servers from the public internet or apply a PowerShell script that disables remote procedure calls to vulnerable endpoints and enforces strict request filtering. CISA has added CVE‑2025‑53770 to its Known Exploited Vulnerabilities catalogue, giving U.S. federal agencies 48 hours to apply mitigations or disconnect affected servers.

 

Anatomy of the attack

  1. Initial access: the attacker sends a crafted SOAP request that triggers unsafe deserialization, achieving code execution as the SharePoint service account.
  2. Payload drop: a small ASPX file (“ToolShell.aspx”) lands in /_layouts/15 and phones home.
  3. Privilege escalation: system tokens are stolen; attackers scour the server for web.config files containing passwords.
  4. Lateral movement & data theft: encrypted secrets are exfiltrated; some victims saw outbound traffic to Teams and OneDrive APIs, indicating wider M365 abuse .

Indicators of compromise published by SOCRadar include SHA‑256 hashes of the web‑shell, malicious user‑agent strings (“toolshell‑loader/1.3”) and command‑and‑control ranges 94.103.9[.]0/24 and 193.23.181[.]0/24 . Detect‑hunters should also look for scheduled tasks invoking mshta.exe, powershell -enc blobs and unusual IIS worker‑process spawns.

 

What to do now

  • Patch if you can: Subscription Edition and 2019 admins should apply Microsoft’s out‑of‑band updates immediately.
  • Mitigate if you can’t: 2016 shops must implement Microsoft’s PowerShell hardening script, enable AMSI, and block internet exposure until a fix ships.
  • Hunt aggressively: query server logs for the ToolShell IOC set, review outbound traffic for odd DNS or HTTP destinations, and rotate all credentials stored inside SharePoint.
  • Prepare for follow‑on attacks: ToolShell backdoors have been used to deploy Cobalt Strike, Bughatch and ransomware loaders within hours of initial compromise.

 

With proof‑of‑concept exploits circulating in Telegram channels and GitHub gists, defenders have little time to spare. Until Microsoft finalises the SharePoint 2016 patch, the safest posture is “isolate, harden and hunt.” As CISA’s weekend alert warns, leaving an unpatched SharePoint server online today is “the digital equivalent of posting admin passwords on your website.” 

Related Posts:

  • 4025691-0-97050800-1753099410-original
    Microsoft Patches SharePoint Bug, Leaves 2016…
  • microsoft-sharepoint-104_v-variantBig1x1_w-1280_zc-3061602c
    SharePoint Zero-day Persists Despite Microsoft Patches
  • 5cdb1bc21ea851eb0c74bf693121f711
    Chinese Hackers Exploiting SharePoint Zero-day - Microsoft
  • sharepoint-stock-image
    Hackers Team Up to Attack Microsoft SharePoint Systems
  • Cloudflare-AI_Bot-Blocking
    Cloudflare Blames React2Shell Protections for Outage
  • shutterstock_chatgpt
    Researchers Warn ChatGPT Crawler May Cause DDoS…
  • 020tYFWBL4Yz8jIIFUdKDR1-22
    A Fix to Microsoft Windows Defender And Security Flaws
  • microsofts-surface-duo-dualscreen-androi-5f1f3d057e8c350ae07dd862-1-jul-28-2020-15-24-20-poster
    Microsoft Patch Tuesday Fixes 63 Bugs, 1 Zero-Day

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: CVE‑2025‑53770microsoft sharepointsecuritysharepointSharePoint Zero-day Vulnerabilitytoolshell
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Google Brings Gemini Personal Intelligence to Free Users March 17, 2026
  • Microsoft Restructures Copilot Leadership as Suleyman Shifts Focus March 17, 2026
  • OpenAI Launches GPT-5.4 Mini and Nano Models March 17, 2026
  • Samsung to Halt Sales of $2,899 Tri-Fold Phone March 17, 2026
  • Nvidia CloudXR Brings RTX Streaming to Apple Vision Pro March 17, 2026
  • MTN Revenue Jumps 23% on Data and Fintech Growth March 17, 2026
  • Nvidia Unveils AI Data Factory Blueprint for Robotics March 17, 2026
  • Nvidia Sees $1 Trillion AI Chip Market by 2027 March 16, 2026
  • Nvidia Expands Open AI Models for Robotics and Healthcare March 16, 2026
  • Guest Chats Comes To WhatsApp On Android & iOS March 16, 2026
  • Nvidia Debuts Dynamo 1.0 as Operating System for AI Factories March 16, 2026
  • NVIDIA Unveils Vera CPU Built for the Age of Agentic AI March 16, 2026

Browse Archives

March 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
« Feb    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.