<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SharePoint Zero-Day CVE-2025-53770 Actively Exploited - Take actions! in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253665#M42598</link>
    <description>&lt;DIV id="tinyMceEditor_7348005ac49942Lesley_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;IPS protection released yesterday. Make sure traffic is inspected with IPS and that HTTPS decryption is done&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sharepoint.jpg" style="width: 858px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30997i96FEE7D6BC38E462/image-dimensions/858x228?v=v2" width="858" height="228" role="button" title="sharepoint.jpg" alt="sharepoint.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Tue, 22 Jul 2025 09:49:39 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2025-07-22T09:49:39Z</dc:date>
    <item>
      <title>SharePoint Zero-Day CVE-2025-53770 Actively Exploited - Take actions!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253601#M42580</link>
      <description>&lt;H3&gt;Attention all security professionals!&lt;/H3&gt;
&lt;P&gt;A critical zero-day SharePoint remote code execution (RCE) vulnerability, tracked as CVE-2025-53770 and nicknamed “ToolShell,” is currently under active exploitation. This vulnerability affects on-premise Microsoft SharePoint servers, allowing unauthenticated attackers to gain full access and execute arbitrary code remotely. Despite&amp;nbsp;&lt;A href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/" target="_blank" rel="noopener"&gt;public guidance from Microsoft&lt;/A&gt;&amp;nbsp;and an alert from&amp;nbsp;&lt;A href="https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770" target="_blank" rel="noopener"&gt;CISA&lt;/A&gt;, a full security patch is not yet available.&lt;/P&gt;
&lt;H3&gt;Key findings:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;A critical zero-day vulnerability (CVE-2025-53770 ) in SharePoint on-prem is actively being exploited in the wild.&lt;/LI&gt;
&lt;LI&gt;Dubbed “ToolShell,” the campaign enables unauthorized access to on-prem SharePoint servers, posing a&amp;nbsp;serious risk to corporate environments&lt;/LI&gt;
&lt;LI&gt;Check Point Research identified the first signs of the exploitation on July 7th.&lt;/LI&gt;
&lt;LI&gt;Since then, we’ve confirmed dozens of compromise attempts across government, telecommunications, and software sectors in North America and Western Europe.&lt;/LI&gt;
&lt;LI&gt;Alarmingly, we see that the attackers also leverage known Ivanti Endpoint vulnerabilities throughout the campaign.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;What did Check Point Research find?&lt;/H3&gt;
&lt;P&gt;Check Point Research found that the first exploitation attempts were observed on July 7th. The target of the attack is a major Western government. The attacks only intensified on July 18th and 19th, using infrastructure tied to the following IP addresses:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;104.238.159.149&lt;/LI&gt;
&lt;LI&gt;107.191.58.76&lt;/LI&gt;
&lt;LI&gt;96.9.125.147&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;One of these IPs was also associated with exploitation attempts against a related Ivanti EPMM vulnerability chain (CVE-2025-4427 and CVE-2025-4428).&lt;/P&gt;
&lt;P&gt;The attack vector involves a custom webshell that parses parameters from VIEWSTATE payloads, enabling insecure deserialization attacks. Targeted sectors include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Government&lt;/LI&gt;
&lt;LI&gt;Software&lt;/LI&gt;
&lt;LI&gt;Telecommunications&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://blog.checkpoint.com/research/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know/" target="_self"&gt;More details are in the company blog post for the matter&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 17:07:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253601#M42580</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-07-21T17:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: SharePoint Zero-Day CVE-2025-53770 Actively Exploited - Take actions!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253612#M42582</link>
      <description>&lt;P&gt;Great job btw...I see shows was released and updated July 20th.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 18:22:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253612#M42582</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-21T18:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: SharePoint Zero-Day CVE-2025-53770 Actively Exploited - Take actions!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253665#M42598</link>
      <description>&lt;DIV id="tinyMceEditor_7348005ac49942Lesley_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;IPS protection released yesterday. Make sure traffic is inspected with IPS and that HTTPS decryption is done&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sharepoint.jpg" style="width: 858px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30997i96FEE7D6BC38E462/image-dimensions/858x228?v=v2" width="858" height="228" role="button" title="sharepoint.jpg" alt="sharepoint.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2025 09:49:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SharePoint-Zero-Day-CVE-2025-53770-Actively-Exploited-Take/m-p/253665#M42598</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-07-22T09:49:39Z</dc:date>
    </item>
  </channel>
</rss>

