Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

Categories: , , ,

Posted on

By

Microsoft Releases Security Patch for Actively Exploited On-Premises SharePoint Vulnerabilities

What is the threat?

Earlier this week Microsoft released a customer guidance blog advising customers of some vulnerabilities in SharePoint that are under active exploitation by threat actors. These vulnerabilities, CVE-2025-53770 and CVE-2025-53771, affect on-premises installations of Microsoft SharePoint. SharePoint is a document sharing and collaboration platform often used by governments and organizations of all sizes to provide file sharing and document collaboration features.

Does this impact your organization?

These vulnerabilities only affect on-premises installations of SharePoint. SharePoint Online (Provided by Microsoft 365) is unaffected. Microsoft has seen nation-state threat actors actively exploiting these vulnerabilities to gain access to Internet-facing SharePoint servers.

If your organization has local installations of SharePoint, whether they are accessible externally or not, you should get the latest patches installed as soon as possible.

What steps should you take to stay secure?

If you have a locally installed SharePoint server, take the following steps to protect your organization:

How do you stay vigilant in the future?

Modern IT infrastructure is complex, and it is inevitable that bugs and vulnerabilities will be discovered in software over time. At Raxis, we recommend that organizations implement effective patching procedures to maintain software and keep it consistently patched. In addition to staying updated, embracing a layered security approach involving endpoint protection, strong passwords, multi-factor authentication, and principals of least privilege will go a long way in bridging the gap between discovery of an exploit and the vendor providing security updates.

How do you know if your processes are working? Performing regular penetration testing of your IT assets can help you understand where gaps in your patching and risk management processes lie.

References


More From Raxis

  • OWASP Top 10 for LLM Applications

    OWASP Top 10 for LLM Applications Penetration Testing

    By Jason Taylor • July 15, 2025
  • Choosing a Penetration Testing Company: Part 2

    Choosing a Penetration Testing Company: Part 2

    By Brad Herring • July 1, 2025
  • Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key

    Wireless Series: Using Wifite to Capture and Crack a WPA2 Pre-Shared Key for Penetration Testing

    By Scottie Cole • June 17, 2025
  • Jailbreak Journey: Transforming an iPad for Mobile App Penetration Testing

    Jailbreak Journey: Transforming an iPad for Mobile App Penetration Testing

    By Jason Taylor • June 3, 2025