Hackers target Microsoft SharePoint again with critical zero-days, over 85 servers hit

Updated on 21-Jul-2025
HIGHLIGHTS

Two new SharePoint zero-days exploited, over 85 servers breached since 18 July.

No patch yet for SharePoint 2016; Microsoft urges immediate mitigations.

CISA adds CVE-2025-53770 to KEV list, mandates patching within 24 hours of release.

Microsoft SharePoint is once again under active attack, with two new zero-day vulnerabilities being exploited in the wild. Tracked as CVE-2025-53770 and CVE-2025-53771, these flaws have been used to compromise at least 85 on-premise SharePoint servers worldwide since 18 July and there’s still no patch available for many affected versions.

The new flaws are particularly alarming because they bypass previous patches issued just weeks earlier. Back in May, cybersecurity researchers at Viettel demonstrated a successful remote code execution (RCE) attack at Pwn2Own Berlin using a chained exploit of CVE-2025-49704 and CVE-2025-49706. Microsoft patched those with its July Patch Tuesday update, but attackers have already developed new methods to sidestep those fixes.

According to a security blog posted by Microsoft, “these vulnerabilities apply to on-premises SharePoint Servers only. SharePoint Online in Microsoft 365 is not impacted.” That’s cold comfort to enterprise IT teams still managing on-prem deployments.

The freshly identified CVE-2025-53770 and CVE-2025-53771 are, in essence, bypasses of the original ToolShell vulnerabilities patched earlier. While the flaws do not impact Microsoft 365 customers, the vast number of legacy deployments of SharePoint 2016 and 2019 leave many organisations exposed. Microsoft has so far released an update (KB5002768) for SharePoint Subscription Edition only. Security updates for the older editions are still in the works.

Microsoft acknowledged that these newer updates “include more robust protections” than the earlier patches, and is urging admins not to delay applying them once available. In the meantime, mitigations are available for organisations that can’t patch immediately.

What can admins do right now?

For administrators unable to install a patch, Microsoft recommends enabling AMSI (Antimalware Scan Interface) integration within SharePoint, installing Microsoft Defender AV, and rotating ASP.NET machine keys. The AMSI feature allows scripts and in-memory code to be scanned in real-time by antivirus software and is enabled by default in SharePoint Server versions since September 2023.

Steps to mitigate Microsoft SharePoint Vulnerability

Rotating machine keys can also help prevent attackers from using stolen credentials to exploit compromised servers. Admins can rotate these either via PowerShell using the Update-SPMachineKey cmdlet or through SharePoint’s Central Administration interface by running the “Machine Key Rotation” job and then restarting IIS across all servers.

Microsoft also strongly advises disconnecting unprotected servers from the internet until an official patch becomes available.

Detection and response

To help organisations identify whether their servers have already been compromised, Microsoft has provided guidance on what to look for. One clear sign of a breach is the presence of the file spinstall0.aspx in the SharePoint layouts directory.

Admins can also use Microsoft 365 Defender with a specific query shared by Microsoft on their blog post to check for evidence of the malicious file being created or accessed. This approach is essential for forensic investigation and ongoing monitoring until the threat is fully mitigated.

UPDATE: Microsoft has released security patches for two of the affected SharePoint releases. More details on the blog post.

  • Microsoft SharePoint Server Subscription Edition – Security Patch available
  • Microsoft SharePoint Server 2019 – Security Patch available
  • Microsoft SharePoint Server 2016 – Not availble yet

Mithun Mohandas

Mithun Mohandas is an Indian technology journalist with 14 years of experience covering consumer technology. He is currently employed at Digit in the capacity of a Managing Editor. Mithun has a background in Computer Engineering and was an active member of the IEEE during his college days. He has a penchant for digging deep into unravelling what makes a device tick. If there's a transistor in it, Mithun's probably going to rip it apart till he finds it. At Digit, he covers processors, graphics cards, storage media, displays and networking devices aside from anything developer related. As an avid PC gamer, he prefers RTS and FPS titles, and can be quite competitive in a race to the finish line. He only gets consoles for the exclusives. He can be seen playing Valorant, World of Tanks, HITMAN and the occasional Age of Empires or being the voice behind hundreds of Digit videos.

Connect On :