A critical zero-day vulnerability, tracked as CVE-2025-53770, is being actively exploited in Microsoft SharePoint Server on-premises installations, posing a severe threat to organizations worldwide. This vulnerability, a variant of the previously patched CVE-2025-49706, allows unauthenticated attackers to execute remote code without user interaction, compromising sensitive data and enabling persistent access. Another related vulnerability, CVE-2025-53771, has also been identified. This blog post details the attack, its timeline, technical aspects, and current remediation strategies, drawing from recent reports and information.
What: Nature of the Attack
The ToolShell exploit chain targets on-premises SharePoint Server instances, exploiting a deserialization vulnerability (CVE-2025-53770) to achieve unauthenticated remote code execution (RCE). Attackers can gain full control over affected systems, steal cryptographic keys (ValidationKey and DecryptionKey), and craft valid __VIEWSTATE payloads to maintain persistent access or move laterally across networks. This vulnerability affects SharePoint Server 2016, 2019, and Subscription Edition but does not impact SharePoint Online in Microsoft 365. A related spoofing flaw, CVE-2025-53771 (CVSS score: 6.3), involves path traversal and further exacerbates the threat. The attack has compromised at least 75 organizations globally, including U.S. federal and state agencies, universities, energy companies, and an Asian telecommunications firm.
Where: Affected Systems
The vulnerabilities exclusively target on-premises SharePoint Server deployments, specifically:
- SharePoint Server 2016 (versions prior to 16.0.5508.1000)
- SharePoint Server 2019 (versions prior to 16.0.10417.20027)
- SharePoint Server Subscription Edition (versions prior to 16.0.18526.20424)
Internet-facing SharePoint servers are particularly at risk, with attackers scanning for vulnerable instances. Over 8,000 servers were scanned, and at least 54–85 organizations have been confirmed compromised, though the true scope may be larger.
When: Timeline of the Attack
- May 2025: The ToolShell exploit chain, combining CVE-2025-49706 (authentication bypass) and CVE-2025-49704 (code injection), was demonstrated at Pwn2Own Berlin by Viettel Cyber Security. Microsoft patched these flaws in the July 2025 Patch Tuesday.
- July 2025: Partial technical disclosures by CODE WHITE GmbH and researcher Soroush Dalili enabled attackers to develop a new exploit, CVE-2025-53770, bypassing the July patches.
- July 18, 2025: Dutch cybersecurity firm Eye Security detected active exploitation at 6:00 PM CET, marking the start of mass attacks. A second wave began on July 19 at 07:28 CET from IP 104.238.159.149.
- July 19, 2025: Microsoft issued an advisory acknowledging active attacks and the absence of a patch for CVE-2025-53770.
- July 20, 2025: CISA added CVE-2025-53770 to its Known Exploited Vulnerabilities Catalog, mandating federal agencies to mitigate by July 21. Microsoft released patches for SharePoint Server 2019 and Subscription Edition, with SharePoint Server 2016 patches still in development.
- July 21, 2025: Ongoing reports confirmed widespread compromises across federal, energy, and private sectors.
How: Technical Details of the Exploit
The attack leverages a deserialization flaw in SharePoint’s handling of untrusted data, allowing attackers to execute arbitrary code without authentication. Key technical aspects include:
- Exploit Mechanism: Attackers target the /_layouts/15/ToolPane.aspx endpoint with a POST request, using /_layouts/SignOut.aspx as the HTTP referer to bypass authentication (CVE-2025-53770). This exploits SharePoint’s trust in its configuration to execute malicious payloads.
- Payload Delivery: A malicious file, spinstall0.aspx, is uploaded to the path C:\PROGRA~1\COMMON~1\MICROS~1\WEBSER~1\16\TEMPLATE\LAYOUTS. This file extracts the server’s MachineKey configuration (ValidationKey and DecryptionKey), enabling attackers to forge valid __VIEWSTATE payloads for persistent RCE. The file’s SHA256 hash is 92bb4ddb98eeaf11fc15bb32e71d0a63256a0ed826a03ba293ce3a8bf057a514.
- Attack Impact: Once compromised, attackers can:
- Access SharePoint’s file systems and internal configurations.
- Deploy persistent backdoors for continued access.
- Move laterally to connected services like Outlook, Teams, and OneDrive, facilitating data theft and password harvesting.
- Indicators of Compromise (IoCs):
- File Creation: Presence of spinstall0.aspx in the specified path.
- Network Activity: Exploitation attempts from IPs 107.191.58.76, 104.238.159.149, and 96.9.125.147 (July 17–19, 2025).
- IIS Logs: Monitor for POST requests to /_layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx with a referer of /_layouts/SignOut.aspx.
- Exploit Sophistication: The attack blends with legitimate SharePoint activity, making detection challenging without deep endpoint visibility. Stolen cryptographic keys allow attackers to persist even after patching, as patches do not rotate these keys.
Current Remediation Recommendations
Microsoft and CISA have provided urgent mitigation steps to protect on-premises SharePoint servers. Organizations should assume compromise and act immediately.
Immediate Actions
- Apply Available Patches:
- SharePoint Server 2019: Install KB5002754 (version 16.0.10417.20027).
- SharePoint Server Subscription Edition: Install KB5002768 (version 16.0.18526.20424).
- SharePoint Server 2016: Patches are not yet available; monitor Microsoft’s MSRC blog for updates.
- Enable Antimalware Scan Interface (AMSI):
- Ensure AMSI integration is enabled (default since September 2023 updates for SharePoint 2016/2019 and Version 23H2 for Subscription Edition).
- Deploy Microsoft Defender Antivirus across all SharePoint servers in Full Mode for optimal protection.
- Deploy Microsoft Defender for Endpoint:
- Use Defender for Endpoint or equivalent solutions to detect and block post-exploit activity, such as webshell installation or lateral movement.
- Disconnect Internet-Facing Servers:
- If AMSI cannot be enabled or patches are unavailable, disconnect SharePoint servers from the internet to prevent further exploitation.
- Rotate Machine Keys:
- After applying patches or enabling AMSI, rotate SharePoint’s ASP.NET machine keys (ValidationKey and DecryptionKey) to invalidate stolen keys.
- Restart IIS on all SharePoint servers using iisreset.exe post-rotation.
- Monitor and Hunt for Compromise:
- Check for the presence of spinstall0.aspx using Microsoft 365 Defender queries:
- Monitor IIS logs for suspicious POST requests and scan network logs for activity from the identified IPs.
- Update Intrusion Prevention Systems (IPS) and Web Application Firewalls (WAF):
- Block exploit patterns and anomalous behavior targeting /_layouts/15/ToolPane.aspx.
- Conduct Incident Response:
- Engage professional incident response teams to assess compromise scope, as attackers may have established persistent access. Check logs for activity prior to mitigation to identify breaches.
Long-Term Recommendations
- Upgrade to Supported Versions: Use supported SharePoint versions (2016, 2019, or Subscription Edition) to ensure patch availability.
- Implement Comprehensive Logging: Follow CISA’s Best Practices for Event Logging and Threat Detection to identify exploitation attempts.
- Consider Cloud Migration: Transition to SharePoint Online, which is unaffected, to reduce exposure to on-premises vulnerabilities.
- Follow Cyber Hygiene Best Practices: Implement CISA’s Top 10 IT Security Actions, including regular patching and key rotation.
Conclusion
The CVE-2025-53770 and CVE-2025-53771 vulnerabilities represent a critical threat to on-premises SharePoint Server environments, with mass exploitation underway since July 18, 2025. Organizations must act swiftly to apply patches, enable AMSI, rotate cryptographic keys, and monitor for compromise. The attack’s ability to steal keys and persist post-patching underscores the need for thorough incident response and proactive security measures.
For additional details, refer to Microsoft’s customer guidance at https://msrc.microsoft.com and CISA’s advisory at https://www.cisa.gov.
Sources
- CISA Alert on SharePoint Vulnerability (CVE-2025-53770)
- URL: https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770
- Published: July 20, 2025
- Details: CISA’s advisory on active exploitation, mitigation recommendations, and addition of CVE-2025-53770 to the Known Exploited Vulnerabilities (KEV) catalog.cisa.gov
- Help Net Security: Microsoft SharePoint Servers Under Attack
- URL: https://www.helpnetsecurity.com/2025/07/20/microsoft-sharepoint-servers-under-attack-via-zero-day-vulnerability-cve-2025-53770/
- Published: July 20, 2025
- Details: Information on the zero-day exploitation, the ToolShell attack chain, and the need for key rotation post-patching.helpnetsecurity.com
- The Hacker News: Critical Unpatched SharePoint Zero-Day
- URL: https://thehackernews.com/2025/07/sharepoint-zero-day-cve-2025-53770.html
- Published: July 20, 2025
- Details: Technical details on CVE-2025-53770, its relation to CVE-2025-49704/49706, and exploitation mechanics, including MachineKey theft.thehackernews.com
- BleepingComputer: Microsoft SharePoint Zero-Day Exploited
- URL: https://www.bleepingcomputer.com/news/security/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/
- Published: July 20, 2025
- Details: Timeline of exploitation, IoCs (e.g., spinstall0.aspx), and Microsoft’s mitigation guidance.bleepingcomputer.com
- Tenable Blog: CVE-2025-53770 FAQ
- URL: https://www.tenable.com/blog/cve-2025-53770-frequently-asked-questions-about-zero-day-sharepoint-vulnerability-exploitation
- Published: July 20, 2025
- Details: Confirmation of exploitation, IoCs, and the role of CODE WHITE GmbH and Soroush Dalili in disclosing technical details.tenable.com
- Eye Security: ToolShell Mass Exploitation (CVE-2025-53770)
- URL: https://research.eye.security/sharepoint-under-siege/
- Published: July 17, 2025
- Details: In-depth analysis of the attack, including IoCs (IP addresses, file paths), exploitation timeline, and cryptographic key theft.research.eye.security
- Microsoft Security Response Center (MSRC) Blog: Customer Guidance for CVE-2025-53770
- URL: https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
- Published: July 19, 2025
- Details: Official Microsoft guidance on mitigations, patch availability for SharePoint 2019 and Subscription Edition, and detection queries.msrc.microsoft.com
- Canadian Centre for Cyber Security: Vulnerability Update
- URL: https://www.cyber.gc.ca/en/alerts-advisories/vulnerability-impacting-microsoft-sharepoint-server-cve-2025-53770-update-1
- Published: July 20, 2025
- Details: Confirmation of exploitation in Canada, IoCs (spinstall0.aspx file path and SHA256 hash), and mitigation advice.cyber.gc.ca
- Cybersecurity News: SharePoint 0-Day RCE Vulnerability
- URL: https://cybersecuritynews.com/sharepoint-0-day-rce-vulnerability/
- Published: July 19, 2025
- Details: Overview of the ToolShell campaign, affected versions, and patch details (though some information on patch availability was inaccurate).cybersecuritynews.com
- Security Affairs: SharePoint Zero-Day Exploited
- URL: https://securityaffairs.com/165841/hacking/sharepoint-zero-day-cve-2025-53770.html
- Published: July 21, 2025
- Details: Confirmation of active exploitation, CVSS scores, and relation to CVE-2025-49706.securityaffairs.com
- Strobes Security: CVE-2025-53770 Overview
- URL: https://strobes.co/blog/cve-2025-53770-microsoft-sharepoint-zero-day-exploited-in-rce-attacks/
- Published: July 20, 2025
- Details: Technical analysis, affected versions, and emphasis on rapid exploitation post-disclosure.strobes.co
Stay updated via Microsoft’s MSRC blog and CISA advisories for further patches, especially for SharePoint Server 2016.












































































































































































































































































































































































































































