CVE-2020-1595

9.9 CRITICAL

📋 TL;DR

CVE-2020-1595 is a critical remote code execution vulnerability in Microsoft SharePoint where improperly protected APIs allow attackers to execute arbitrary code by sending specially-formatted input. Successful exploitation gives attackers full control over the SharePoint application pool and server farm account. Organizations running affected SharePoint versions with internet-facing or internal SharePoint servers are at risk.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
  • Microsoft SharePoint Foundation
Versions: Multiple versions including SharePoint 2010, 2013, 2016, and 2019
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both SharePoint Server and SharePoint Foundation editions. Requires user access to vulnerable API endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SharePoint server farm, allowing attacker to execute arbitrary code with SharePoint application pool privileges, potentially leading to data theft, lateral movement, and full domain compromise.

🟠

Likely Case

Attacker gains control of SharePoint server, accesses sensitive data, and uses compromised server as foothold for further attacks within the network.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to SharePoint environment only, preventing lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to SharePoint API endpoints. Proof-of-concept code has been publicly released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Microsoft security updates from September 2020 or later

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595

Restart Required: Yes

Instructions:

1. Download and install the September 2020 security update for SharePoint from Microsoft Update Catalog. 2. Apply the update to all SharePoint servers in the farm. 3. Restart SharePoint services or reboot servers as required. 4. Test SharePoint functionality after patching.

🔧 Temporary Workarounds

Restrict API Access

windows

Limit access to SharePoint API endpoints using network firewalls or SharePoint permissions

Implement WAF Rules

all

Configure web application firewall to block suspicious deserialization patterns

🧯 If You Can't Patch

  • Isolate SharePoint servers in separate network segments with strict firewall rules
  • Implement strict access controls and monitor all API access attempts

🔍 How to Verify

Check if Vulnerable:

Check SharePoint version and patch level. If running affected versions without September 2020 security updates, system is vulnerable.

Check Version:

Get-SPFarm | Select BuildVersion in SharePoint PowerShell

Verify Fix Applied:

Verify SharePoint version shows September 2020 or later security updates installed. Test API endpoints for proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API access patterns
  • Failed deserialization attempts in SharePoint logs
  • Unexpected process execution from SharePoint application pool

Network Indicators:

  • Unusual traffic to SharePoint API endpoints
  • Suspicious deserialization payloads in HTTP requests

SIEM Query:

source="sharepoint*" AND ("deserialization" OR "api" AND "error") AND NOT status=200

🔗 References

📤 Share & Export