Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on July 22, 2025
Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

Written by Jason Taylor

What is the threat?

Earlier this week Microsoft released a customer guidance blog advising customers of some vulnerabilities in SharePoint that are under active exploitation by threat actors. These vulnerabilities, CVE-2025-53770 and CVE-2025-53771, affect on-premises installations of Microsoft SharePoint. SharePoint is a document sharing and collaboration platform often used by governments and organizations of all sizes to provide file sharing and document collaboration features.

Does this impact your organization?

These vulnerabilities only affect on-premises installations of SharePoint. SharePoint Online (Provided by Microsoft 365) is unaffected. Microsoft has seen nation-state threat actors actively exploiting these vulnerabilities to gain access to Internet-facing SharePoint servers.

If your organization has local installations of SharePoint, whether they are accessible externally or not, you should get the latest patches installed as soon as possible.

What steps should you take to stay secure?

If you have a locally installed SharePoint server, take the following steps to protect your organization:

How do you stay vigilant in the future?

Modern IT infrastructure is complex, and it is inevitable that bugs and vulnerabilities will be discovered in software over time. At Raxis, we recommend that organizations implement effective patching procedures to maintain software and keep it consistently patched. In addition to staying updated, embracing a layered security approach involving endpoint protection, strong passwords, multi-factor authentication, and principals of least privilege will go a long way in bridging the gap between discovery of an exploit and the vendor providing security updates.

How do you know if your processes are working? Performing regular penetration testing of your IT assets can help you understand where gaps in your patching and risk management processes lie.

References

Jason Taylor

Jason Taylor

Jason has a passion for asking “what-if” questions and for trying to “break” software and test how it responds to unintended uses. Jason has a background in System Administration and Security Engineering in the financial sector. He holds both defensive and offensive certifications including OSCP, PNPT, GCIH, CASP+, and is Splunk Certified. When he’s not spending his time taking new training courses, he loves spending time with his wife and kids and occasionally working on an IoT project to automate some aspect of their greenhouse or chicken coop.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.