Critical Sharepoint 0-Day Vulnerablity Exploited CVE-2025-53770 (ToolShell)

Date:

Share post:

Microsoft announced yesterday that a newly discovered critical remote code execution vulnerability in SharePoint is being exploited. There is no patch available. As a workaround, Microsoft suggests using Microsoft Defender to detect any attacks. To use Defender, you must first configure the AMSI integration to give Defender visibility into SharePoint. Recent versions of SharePoint have the AMSI integration enabled by default.

Microsoft also states: “If you cannot enable AMSI, we recommend you consider disconnecting your server from the internet until a security update is available.”

Defender will just detect the post-exploit activity. Currently, webshells are observed as a payload being deployed, taking advantage of the vulnerability.

The best write-up and details I found so far come from the Eye Security research team. They initially used CVE-2025-49704 and CVE-2025-49706 to identify the vulnerability. Later, Microsoft confirmed that this is a new issue and started using CVE-2025-53700. This latest issue appears to be a variation of the older vulnerabilities patched in this month’s Patch Tuesday.

The vulnerability exploits an authentication bypass issue triggered by setting the “Referer” header to “/_layouts/SignOut.aspx”. This vulnerability is then exploited to trigger remote code execution via “/_layouts/15/ToolPane.aspx”. 

In our honeypot data, we observed two instances of the “ToolPane.aspx” URL, first on July 16th (on individual hit, I am waiting to hear from the submitter to see if there are details available). Today, we received additional reports, but they originated from p55001.probes.atlas.ripe.net:9000 and are likely related to scanning for research purposes. These hits did not include the Referer header to trigger the vulnerabiliy.

The hit on July 16th originated from 172.174.82.132. This IP address appears to be owned by Microsoft.

Microsoft Advisory:

https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/

Eye Security Blog:

https://research.eye.security/sharepoint-under-siege/

 



Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu

Twitter|

Source link

spot_img

Related articles

Scott Pilgrim EX Brings More Beat ‘Em Up Action To Switch In “Early 2026”

https://www.youtube.com/watch?v=nnR9UNNDEt0Watch on YouTube Subscribe to Nintendo Life on YouTube828k Update : At San Diego Comic-Con this weekend, Tribute...

Axact – Darknet Diaries

Full Transcript Axact sells fake diplomas and degrees. What could go wrong with this business...

Nvidia N1X SoC leaks with the same number of CUDA cores as an RTX 5070 — N1X specs align with the GB10 Superchip

Nvidia's long-rumored and long-delayed N1X SoC has broken cover once again, this time revealing its GPU capabilities through...

How to Repurpose Event Content for SEO and Lead Generation

Every event, whether in-person, virtual, or hybrid, produces a wealth of valuable content. Yet, too often, that content...