Skip to main content

Immediate action required:
Vulnerability in SharePoint

Microsoft informs about a currently exploited vulnerability in on-premises versions of SharePoint Server, known as CVE-2025-53770 and CVE-2025-53771. The vulnerability only affects local installations of SharePoint Server. SharePoint Online in Microsoft 365 is not affected.

The threat situation

The current vulnerability is being actively exploited by attackers to gain access to local SharePoint servers. Non-updated versions are particularly vulnerable. A successful attack could allow attackers to execute unauthorized code on the systems and compromise sensitive company data.

Important steps for IT administrators

IT administrators need to take extra care to protect their SharePoint environments. The following measures should be taken immediately:

ATTENTION! Verification necessary

Due to the systematic exploitation of the vulnerability even before the patches are released, it is absolutely necessary to check for a compromise!

Install the latest security updates:

 

Activation of the Antimalware Scan Interface (AMSI)

Enable and configure AMSI for optimized threat detection. This includes the installation of Microsoft Defender Antivirus on all SharePoint servers.

Rotation of ASP.NET machine keys

After installing security updates or activating AMSI, you should rotate the machine keys of your SharePoint servers and restart the IIS server (`iisreset.exe`).

Call to managers

IT managers and decision makers should prioritize the security measures of their teams in order to protect company data. Attacks of this type often have serious consequences for the affected organization.

This article provides quick information. Stay on the ball and obtain further important information and the necessary updates directly from Microsoft. Act now and protect your IT infrastructure from attacks.