TTB White LOGO TB
  • News
  • PC & Hardware
  • Mobiles
  • Gaming
  • Electronics
  • Gadget
  • Reviews
  • How To
Trending
Teen Accounts on Instagram Gain New Safety Reminders and Block Tools
YouTube Shorts Adds AI Image‑to‑Video and New Effects
Apple Watch Theft and Loss Protection Added to AppleCare+
New AppleCare One Plan Brings Multi‑Device Support Under One Subscription
LG Chooses FuriosaAI Chip over Nvidia for New EXAONE Platform
Thursday, Jul 24, 2025
The Tech BasicThe Tech Basic
Font ResizerAa
Search
  • News
  • PC & Hardware
  • Mobiles
  • Gaming
  • Electronics
  • Gadget
  • Reviews
  • How To
Follow US
SharePoint
The Tech Basic > News > New SharePoint RCE Exploit Breaches on‑Prem Labs at NATO, Banks and More
News

New SharePoint RCE Exploit Breaches on‑Prem Labs at NATO, Banks and More

Salman Akhtar
Last updated: 23 July 2025 03:33
Salman Akhtar
Share
Image Source: ITPro
SHARE

A critical zero‑day vulnerability in Microsoft SharePoint software has been used to breach nearly 100 on‑premises servers worldwide, security researchers report. The flaw, tracked as CVE‑2025‑53770, allows attackers to execute code on vulnerable servers without authentication and extract cryptographic keys that grant persistent access.

Contents
Discovery and scope of the attackHow the exploit worksDangers of stolen keysMicrosoft response and patch statusMitigation recommendations
SharePoint
Image Source: Vectra AI

Discovery and scope of the attack

Eye Security first detected the exploit on July 18, 2025, when a client’s intruder‑detection system flagged a suspicious .aspx upload on a SharePoint 2019 server. A joint scan with the Shadowserver Foundation revealed close to 100 compromised servers in the United States, Germany, and other countries. Many victims were government agencies, though private sector firms in energy, finance, healthcare, and industry also appeared on the list.

How the exploit works

The chain of attacks is based on two proof-of-concept bugs presented at the Pwn2Own contest in May: CVE 2025 49706 and CVE 2025 49704. The attackers send a forged POST request to the ToolPane.aspx endpoint that contains a forged header: Referer /SignOut.aspx. This goes around authentication and plants a malicious spinstall0.aspx web shell. Shell, then, will execute the code with the web server process and steal ASP.NET machine keys that will be able to decrypt authentication tokens and still be valid after reboots or patches.

Dangers of stolen keys

After gaining access to the machine keys, a bad actor is able to produce authentic session tokens for any user or service. They have the freedom of horizontal movement to other related programs like Outlook Teams and OneDrive, or leave behind backdoors at the cost of long-term spying. Applying the patch alone does not recall stolen keys and therefore the compromised servers will continue to be susceptible to an attack unless the operators rotate their cryptography keys and perform a complete forensic scan.

Microsoft response and patch status

Microsoft released security updates for SharePoint Server 2019 and SharePoint Subscription Edition on July 19, 2025, and is finalizing a fix for SharePoint 2016. The company advises immediate installation of these patches. Administrators must also rotate ASP.NET machine keys after patching to block any token‑based persistence by threat actors.

SharePoint
Image Source: Bleeping Computer

Mitigation recommendations

Until patches are applied, organizations should isolate on‑premises SharePoint servers from the internet and monitor IIS logs for suspicious requests to /ToolPane.aspx or unusual Referer headers. Shadowserver and CISA recommend assuming compromise and performing a thorough incident response, including key rotation token invalidation and review of connected Active Directory credentials.

This widespread intrusion highlights the importance of rapid patch management and the need to verify that updates truly remove attacker access. By following vendor guidance and taking extra steps to secure machine keys, enterprises can reduce the risk of continuing espionage on critical collaboration infrastructure.

TAGGED:Microsoft
Share This Article
Facebook Reddit Copy Link Print
Share
Salman Akhtar
By Salman Akhtar
View enlightening tech pieces written by Salman Keep up with the most recent news, advice, and trends in the field of technology.

Let's Connect

FacebookLike
XFollow
PinterestPin
InstagramFollow
Google NewsFollow
FlipboardFollow

Popular Posts

Instagram

Teen Accounts on Instagram Gain New Safety Reminders and Block Tools

Salman Akhtar
YouTube Shorts

YouTube Shorts Adds AI Image‑to‑Video and New Effects

Salman Akhtar
AppleCare+

Apple Watch Theft and Loss Protection Added to AppleCare+

Salman Akhtar
AppleCare One

New AppleCare One Plan Brings Multi‑Device Support Under One Subscription

Salman Akhtar

You Might Also Like

Microsoft SharePoint
News

Global Microsoft SharePoint Zero-Day Attack: Patches, Impact, Mitigation

WhatsApp
News

WhatsApp Replaces Native Windows App with Web Wrapper

Windows 11
News

Microsoft Introduces Background Preloading for Word on Windows 11

Copilot on Windows 11
News

Microsoft Tests Full Desktop Sharing with Copilot on Windows 11

Social Networks

Facebook-f Twitter Instagram Pinterest Rss

Company

  • About Us
  • Our Team
  • Contact Us

Policies

  • Disclaimer
  • Privacy Policy
  • Cookies Policy
Latest
LG Chooses FuriosaAI Chip over Nvidia for New EXAONE Platform
OpenAI and Google Both Earn IMO Gold in AI Breakthrough
Apple Details Ethical Data Practices for AI Model Training
Telegram Brings Seamless Crypto On‑Ramp to US via TON Wallet
Chrome for iOS: Enterprise Work/Personal Account Switching Launches

© 2024 The Tech Basic INC. 700 – 2 Park Avenue New York, NY.

TTB White LOGO TB
Follow US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?