Microsoft SharePoint Under Zero-Day Attack, Patch Pending

Microsoft confirms active zero-day attacks on on-premises SharePoint servers, no patch yet; mitigation advised amid rising risk.

Published on

Microsoft has confirmed an active and ongoing zero-day attack targeting on-premises SharePoint servers via a newly identified vulnerability, CVE-2025-53770. Despite recent patches to a related flaw, this variant remains unpatched, exposing organizations worldwide to significant risk.

Body:

Google Advertisement

What Happened?

On July 19, 2025, Microsoft publicly acknowledged that attackers are actively exploiting a critical zero-day vulnerability in SharePoint Server, a variant of the recently patched CVE-2025-49706. This new flaw, CVE-2025-53770, allows unauthenticated remote code execution.

How Is the Attack Conducted?

Google Advertisement

Attackers leverage this vulnerability to deploy a stealthy backdoor—a malicious ASPX file called spinstall0.aspx—which extracts SharePoint’s cryptographic keys. These keys enable forged requests mimicking legitimate authentication, allowing attackers to gain persistent server control.

Where and Who Is Affected?

The attacks target on-premises SharePoint Server 2016, 2019, and Subscription Edition, affecting dozens of organizations globally, especially across Europe. Crucially, SharePoint Online (Microsoft 365) remains unaffected.

Google Advertisement

Microsoft's Response and Interim Measures

Currently, no official patch is available. Microsoft urges customers to enable Antimalware Scan Interface (AMSI) integration and deploy Microsoft Defender Antivirus on SharePoint servers. If AMSI cannot be enabled, disconnecting SharePoint servers from internet access is strongly advised.

Conclusion:
This unfolding crisis underscores the urgent threat posed by sophisticated zero-day exploits targeting critical collaboration infrastructure. Organizations with on-premises SharePoint must act immediately on Microsoft’s mitigation advice while monitoring for updates on a forthcoming security patch.

Credible Attribution:
Information verified by Microsoft security advisories and analysis from leading cybersecurity firms Eye Security and CISA.

Want to engage with this content?

Like, comment, or share this article on our main website for the full experience!

Go to Main Website for Full Features

Dr. Ambrose Greenfelder

Senior Editor & Content Strategist

Dr. Ambrose Greenfelder is a highly skilled and detail-oriented Senior Editor with over a decade of experience in digital journalism, editorial strategy, and content curation. He leads the editorial team at HeyColleagues.com, ensuring every article meets the highest standards of accuracy, clarity, SEO best practices, and journalistic integrity. With a background in media studies and a doctorate in communication, Dr. Greenfelder specializes in shaping compelling narratives, mentoring writers, and aligning content with reader interests and search trends. His editorial vision plays a crucial role in keeping the website informative, trustworthy, and engaging for a global audience.

More by this author →

Hey Colleagues – Official Source for News & StoriesHey Colleagues, an Indian government registered news platform, delivers authoritative daily updates, verified reports, and trusted stories worldwide.

👉 Read Full Article on Website