CVE-2021-34468

7.1 HIGH

📋 TL;DR

CVE-2021-34468 is a remote code execution vulnerability in Microsoft SharePoint Server that allows authenticated attackers to execute arbitrary code on affected servers. This affects organizations running vulnerable SharePoint Server versions. Attackers need authenticated access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
Versions: Microsoft SharePoint Server 2019, Microsoft SharePoint Server 2016, Microsoft SharePoint Server 2013 Service Pack 1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: SharePoint Online (Office 365) is not affected. Only on-premises SharePoint installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SharePoint Server with potential lateral movement to other systems in the network, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Unauthorized code execution leading to data theft, privilege escalation, or deployment of ransomware/malware within the SharePoint environment.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege access controls, and proper monitoring detecting anomalous SharePoint activity.

🌐 Internet-Facing: MEDIUM - While authentication is required, internet-facing SharePoint servers are more exposed to credential attacks and exploitation attempts.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials or compromised accounts could exploit this vulnerability to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to SharePoint. The vulnerability was discovered by the Zero Day Initiative and responsibly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2021 security updates for SharePoint Server

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34468

Restart Required: Yes

Instructions:

1. Download the July 2021 security update for your SharePoint Server version from Microsoft Update Catalog. 2. Apply the update to all affected SharePoint servers. 3. Restart the servers as required. 4. Test SharePoint functionality after patching.

🔧 Temporary Workarounds

Restrict SharePoint Access

all

Limit access to SharePoint servers to only necessary users and implement network segmentation.

Implement Least Privilege

windows

Ensure SharePoint users have only the minimum permissions required for their roles.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SharePoint servers from critical systems
  • Enhance monitoring and logging of SharePoint authentication and administrative activities

🔍 How to Verify

Check if Vulnerable:

Check SharePoint Server version and compare against patched versions. Vulnerable if running SharePoint Server 2019, 2016, or 2013 SP1 without July 2021 security updates.

Check Version:

Get-SPFarm | Select BuildVersion (PowerShell on SharePoint server)

Verify Fix Applied:

Verify that July 2021 security updates are installed via Windows Update history or by checking SharePoint version/build numbers.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to SharePoint
  • Unexpected process creation from SharePoint application pool
  • Suspicious PowerShell or command execution from SharePoint context

Network Indicators:

  • Anomalous outbound connections from SharePoint servers
  • Unexpected network traffic patterns from SharePoint to internal systems

SIEM Query:

source="SharePoint Logs" AND (event_id=4688 OR process_creation) AND parent_process="w3wp.exe" AND (process_name="powershell.exe" OR process_name="cmd.exe")

🔗 References

📤 Share & Export