The Exploit

Notes from the Front Lines of Penetration Testing

Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

Posted on

Categories: , , ,
Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

Written by

What is the threat?

Earlier this week Microsoft released a customer guidance blog advising customers of some vulnerabilities in SharePoint that are under active exploitation by threat actors. These vulnerabilities, CVE-2025-53770 and CVE-2025-53771, affect on-premises installations of Microsoft SharePoint. SharePoint is a document sharing and collaboration platform often used by governments and organizations of all sizes to provide file sharing and document collaboration features.

Does this impact your organization?

These vulnerabilities only affect on-premises installations of SharePoint. SharePoint Online (Provided by Microsoft 365) is unaffected. Microsoft has seen nation-state threat actors actively exploiting these vulnerabilities to gain access to Internet-facing SharePoint servers.

If your organization has local installations of SharePoint, whether they are accessible externally or not, you should get the latest patches installed as soon as possible.

What steps should you take to stay secure?

If you have a locally installed SharePoint server, take the following steps to protect your organization:

How do you stay vigilant in the future?

Modern IT infrastructure is complex, and it is inevitable that bugs and vulnerabilities will be discovered in software over time. At Raxis, we recommend that organizations implement effective patching procedures to maintain software and keep it consistently patched. In addition to staying updated, embracing a layered security approach involving endpoint protection, strong passwords, multi-factor authentication, and principals of least privilege will go a long way in bridging the gap between discovery of an exploit and the vendor providing security updates.

How do you know if your processes are working? Performing regular penetration testing of your IT assets can help you understand where gaps in your patching and risk management processes lie.

References


Jason Taylor

Also by Jason Taylor

Human Vs AI Pentesting

While AI tools offer speed in detecting known vulnerabilities, they fall short with 20-35% false positives and only 50-65% success on complex threats like business logic flaws, as per mainstream reports from Verizon and OWASP. Human penetration testers at Raxis deliver 85-90% detection rates, precise prioritization, and ethical adaptability, ensuring your organization stays ahead of real-world attacks.

Partner With Raxis

Partnering with Raxis empowers your business with elite penetration testing services, competitive reseller pricing, and recurring revenue opportunities, all backed by a proven track record of excellence and a commitment to staying ahead of evolving cybersecurity threats.

Penetration Testing

Tailored, expert-led penetration testing services that uncovers hidden vulnerabilities using real-world hacker techniques, providing actionable insights to strengthen your defenses and protect against sophisticated cyber threats.

Ready To See Raxis One In Action?

See how we transform traditional pen testing into interactive security intelligence that keeps you informed every step of the way. From real-time attack progression to detailed remediation guidance, Raxis One gives you unprecedented visibility into your security posture as it’s being tested.