CVE-2021-31966

7.2 HIGH

📋 TL;DR

CVE-2021-31966 is a remote code execution vulnerability in Microsoft SharePoint Server that allows authenticated attackers to execute arbitrary code on affected servers. This affects organizations running vulnerable SharePoint Server versions, potentially compromising sensitive data and server integrity. Attackers need authenticated access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
  • Microsoft SharePoint Foundation
Versions: Microsoft SharePoint Server 2019, SharePoint Server 2016, SharePoint Server 2013 Service Pack 1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: SharePoint Online is not affected. Only on-premises SharePoint installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SharePoint Server allowing attackers to execute arbitrary code, steal sensitive data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Data exfiltration from SharePoint sites, installation of backdoors, and lateral movement within the network using compromised SharePoint credentials.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege access controls, and monitoring that detects anomalous SharePoint activity.

🌐 Internet-Facing: HIGH if SharePoint is exposed to the internet with authenticated user access, as attackers can exploit it remotely.
🏢 Internal Only: MEDIUM for internal SharePoint servers, requiring authenticated access but posing significant risk from insider threats or compromised credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to SharePoint. No public proof-of-concept available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2021 security updates for SharePoint Server

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31966

Restart Required: Yes

Instructions:

1. Download the June 2021 security update for your SharePoint version from Microsoft Update Catalog. 2. Apply the update to all SharePoint servers. 3. Restart SharePoint services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Restrict SharePoint Access

all

Limit SharePoint access to only necessary users and implement network segmentation.

Enable Enhanced Security

windows

Configure SharePoint with enhanced security settings and disable unnecessary features.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SharePoint servers from critical systems
  • Enforce multi-factor authentication and least privilege access controls for all SharePoint users

🔍 How to Verify

Check if Vulnerable:

Check SharePoint version and compare against patched versions. Vulnerable if running SharePoint Server 2019, 2016, or 2013 SP1 without June 2021 updates.

Check Version:

Get-SPFarm | Select BuildVersion in SharePoint Management Shell

Verify Fix Applied:

Verify SharePoint version includes June 2021 security updates and check Central Administration for update status.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PowerShell execution from SharePoint processes
  • Suspicious file uploads or server-side code execution attempts in SharePoint logs
  • Authentication anomalies for SharePoint accounts

Network Indicators:

  • Unusual outbound connections from SharePoint servers
  • Anomalous traffic patterns to/from SharePoint ports

SIEM Query:

source="sharepoint_logs" AND (event_id="6398" OR event_id="6399") AND process_execution="powershell.exe"

🔗 References

📤 Share & Export