Summary

Microsoft confirms active zero-day attacks on on-premises SharePoint servers, no patch yet; mitigation advised amid rising risk.

Article Body

Microsoft SharePoint Under Zero-Day Attack, Patch Pending
Microsoft SharePoint Under Zero-Day Attack, Patch Pending

Microsoft has confirmed an active and ongoing zero-day attack targeting on-premises SharePoint servers via a newly identified vulnerability, CVE-2025-53770. Despite recent patches to a related flaw, this variant remains unpatched, exposing organizations worldwide to significant risk.

Body:

What Happened?

On July 19, 2025, Microsoft publicly acknowledged that attackers are actively exploiting a critical zero-day vulnerability in SharePoint Server, a variant of the recently patched CVE-2025-49706. This new flaw, CVE-2025-53770, allows unauthenticated remote code execution.

How Is the Attack Conducted?

Attackers leverage this vulnerability to deploy a stealthy backdoor—a malicious ASPX file called spinstall0.aspx—which extracts SharePoint’s cryptographic keys. These keys enable forged requests mimicking legitimate authentication, allowing attackers to gain persistent server control.

Where and Who Is Affected?

The attacks target on-premises SharePoint Server 2016, 2019, and Subscription Edition, affecting dozens of organizations globally, especially across Europe. Crucially, SharePoint Online (Microsoft 365) remains unaffected.

Microsoft's Response and Interim Measures

Currently, no official patch is available. Microsoft urges customers to enable Antimalware Scan Interface (AMSI) integration and deploy Microsoft Defender Antivirus on SharePoint servers. If AMSI cannot be enabled, disconnecting SharePoint servers from internet access is strongly advised.

Conclusion:
This unfolding crisis underscores the urgent threat posed by sophisticated zero-day exploits targeting critical collaboration infrastructure. Organizations with on-premises SharePoint must act immediately on Microsoft’s mitigation advice while monitoring for updates on a forthcoming security patch.

Credible Attribution:
Information verified by Microsoft security advisories and analysis from leading cybersecurity firms Eye Security and CISA.

Comments

TOPICS MENTIONED IN THIS ARTICLE

About the Author(s)

  • Dr. Ambrose Greenfelder photo

    Dr. Ambrose Greenfelder

    Senior Editor & Content Strategist

    Dr. Ambrose Greenfelder is a highly skilled and detail-oriented Senior Editor with over a decade of experience in digital journalism, editorial strategy, and content curation. He leads the editorial team at HeyColleagues.com, ensuring every article meets the highest standards of accuracy, clarity, SEO best practices, and journalistic integrity. With a background in media studies and a doctorate in communication, Dr. Greenfelder specializes in shaping compelling narratives, mentoring writers, and aligning content with reader interests and search trends. His editorial vision plays a crucial role in keeping the website informative, trustworthy, and engaging for a global audience.

    View all articles by Dr. Ambrose Greenfelder

Hey Colleagues – Official Source for News & Stories — Hey Colleagues, an Indian government registered news platform, delivers authoritative daily updates, verified reports, and trusted stories worldwide.