Skip to content

Information on a security flaw being utilized on Microsoft SharePoint servers

Microsoft responds with an immediate patch to address a security flaw in SharePoint, a software solution of theirs, that cybercriminals have been using for widespread attacks on businesses and certain federal agencies. In a blog post, the company reported that over three dozen systems worldwide...

Exploring a security flaw being leveraged on Microsoft SharePoint server systems
Exploring a security flaw being leveraged on Microsoft SharePoint server systems

Information on a security flaw being utilized on Microsoft SharePoint servers

A recently discovered zero-day exploit has been causing concern among cybersecurity professionals, as it targets the undisclosed vulnerability in Microsoft's SharePoint software. This exploit, known as "ToolShell," allows unauthenticated remote attackers to execute arbitrary commands and escalate privileges on affected on-premises SharePoint servers.

Adam Meyers, senior vice president with CrowdStrike, a cybersecurity firm, has stated that anybody with a hosted SharePoint server has a problem due to this vulnerability. The exploit poses a significant risk to organizations with on-premise SharePoint servers, and Microsoft has issued an emergency fix to address this issue.

The zero-day exploit is a variant of the existing vulnerability CVE-2025-49706. It was discovered and actively exploited in mid-2025, and its zero-day nature means that Microsoft initially had no time to fix the flaw before attackers began weaponizing it. As a result, widespread exploitation has affected government, healthcare, education, and large enterprise sectors.

Google's Threat Intelligence Group has also issued a warning about the vulnerability. Michael Sikorski, CTO and Head of Threat Intelligence for Unit 42 at Palo Alto Networks, advises organizations running on-prem SharePoint to take immediate action. He recommends applying all relevant patches, rotating all cryptographic material, and engaging professional incident response.

The emergency fix is available for SharePoint Server 2019 and SharePoint Server Subscription Edition, but engineers are still working on a fix for the older SharePoint Server 2016 software. In the meantime, a temporary fix suggested by Sikorski is to unplug the Microsoft SharePoint from the internet until a patch is available.

CISA (Cybersecurity and Infrastructure Security Agency) warns that the impact of the exploit could be widespread and recommends disconnecting affected servers from the internet until they are patched. Eye Security, a cybersecurity firm, scanned over 8,000 SharePoint servers worldwide and discovered at least dozens of systems compromised, with attacks likely beginning on July 18.

Companies and government agencies around the world use SharePoint for internal document management, data organization, and collaboration. The vulnerability does not affect Microsoft's cloud-based SharePoint Online service, but on-premise SharePoint servers are at immediate risk. Security researchers warn that the exploit may allow bad actors to bypass future patching, making it crucial for organizations to apply the emergency fix as soon as possible.

  1. The cybersecurity concern, the zero-day exploit known as "ToolShell," is not only affecting Microsoft's on-premises SharePoint servers but also poses a significant risk to organizations that rely on data-and-cloud-computing, given its ability to bypass future patching.
  2. As a response to the zero-day exploit, Michael Sikorski, CTO and Head of Threat Intelligence for Unit 42 at Palo Alto Networks, advises organizations running on-premise SharePoint, a technology used widely for internal document management and collaboration, to immediately apply all relevant patches, rotate all cryptographic material, and engage professional incident response.

Read also:

    Latest