CVE-2025-53770

9.8 CRITICAL CISA KEV

📋 TL;DR

CVE-2025-53770 is a critical deserialization vulnerability in on-premises Microsoft SharePoint Server that allows unauthenticated attackers to execute arbitrary code remotely. This affects organizations running vulnerable SharePoint Server instances, particularly those exposed to untrusted networks. Microsoft has confirmed active exploitation in the wild.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
Versions: Specific versions not yet detailed in public advisories, but all on-premises SharePoint Server versions are presumed vulnerable until patched.
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-premises SharePoint Server installations. SharePoint Online (Microsoft 365) is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the SharePoint server leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Unauthorized remote code execution leading to data theft, credential harvesting, and installation of backdoors or malware.

🟢

If Mitigated

Limited impact with proper network segmentation, application controls, and monitoring in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH - Internet-facing SharePoint servers are directly exploitable by unauthenticated attackers without any user interaction.
🏢 Internal Only: HIGH - Internal SharePoint servers are vulnerable to any attacker who gains network access, including compromised endpoints or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft confirms active exploitation in the wild. Public proof-of-concept code is available on GitHub, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not yet released

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770

Restart Required: Yes

Instructions:

1. Monitor Microsoft Security Response Center for patch release. 2. Test patch in non-production environment. 3. Apply patch to all affected SharePoint servers during maintenance window. 4. Restart servers as required.

🔧 Temporary Workarounds

Block SharePoint web services

windows

Temporarily block access to SharePoint web services endpoints that handle deserialization to prevent exploitation.

Use firewall rules to block inbound traffic to SharePoint web services ports (typically 443 for HTTPS)

Implement network segmentation

all

Isolate SharePoint servers from untrusted networks and restrict access to authorized IP addresses only.

Configure firewall ACLs to allow only trusted IP ranges to SharePoint servers

🧯 If You Can't Patch

  • Immediately isolate SharePoint servers from internet and untrusted networks using firewall rules
  • Implement application control to block execution of unauthorized binaries and scripts on SharePoint servers

🔍 How to Verify

Check if Vulnerable:

Check if running on-premises SharePoint Server. If yes, assume vulnerable until patched.

Check Version:

Get-SPFarm | Select BuildVersion (PowerShell on SharePoint server)

Verify Fix Applied:

After patch installation, verify SharePoint Server version matches patched version from Microsoft advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events from w3wp.exe (SharePoint worker process)
  • Suspicious deserialization errors in SharePoint ULS logs
  • Failed authentication attempts followed by successful requests

Network Indicators:

  • Unusual outbound connections from SharePoint servers
  • HTTP requests to SharePoint web services from unexpected source IPs
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="SharePoint" AND (event_id=5002 OR event_id=6398 OR "Deserialization" OR "w3wp.exe" AND process_create)

🔗 References

📤 Share & Export