<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inside the SharePoint Zero-Day (CVE-2025-53770): What It Means and How to Stay Protected - Mater in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Inside-the-SharePoint-Zero-Day-CVE-2025-53770-What-It-Means-and/m-p/253902#M42640</link>
    <description>&lt;P&gt;Very informative.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jul 2025 16:36:18 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-07-24T16:36:18Z</dc:date>
    <item>
      <title>Inside the SharePoint Zero-Day (CVE-2025-53770): What It Means and How to Stay Protected - Materials</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inside-the-SharePoint-Zero-Day-CVE-2025-53770-What-It-Means-and/m-p/253896#M42638</link>
      <description>&lt;P&gt;Here is the video recording of our session&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FqWujDgjFBVk%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DqWujDgjFBVk&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FqWujDgjFBVk%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="112" scrolling="no" title="Inside the SharePoint Zero-Day (CVE-2025-53770)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;Slides we used are also attached.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please also watch the video by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/177"&gt;@Peter_Elmer&lt;/a&gt;&amp;nbsp;explaining how to set up the IPS protections fro this vulnerability correctly:&lt;BR /&gt;&lt;BR /&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fk8xHyW860pg%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dk8xHyW860pg&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fk8xHyW860pg%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="112" scrolling="no" title="Threat Prevention Configuration for IPS Protection CVE-2025-53770" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;Here are some of the Q&amp;amp;A which were not answered live:&lt;/P&gt;
&lt;H4&gt;Q: We moved to SharePoint Online, but we still have an on-prem legacy SharePoint server for historical data, which cannot be access from external IPs. Will it still be affected and vulnerable?&lt;/H4&gt;
&lt;P&gt;A:&amp;nbsp;The vulnerable component is the web server. As long as there is no web interface exposed to the internet it is not exploitable from outside the network. However, it is still important to patch it as it can be exploited from the internal network. The risk, however, is indeed smaller.&lt;/P&gt;
&lt;H4&gt;Q:&amp;nbsp;Is it true that the first vendor that disclosed the vulnerability was TrendMicro?&lt;/H4&gt;
&lt;P&gt;A:&amp;nbsp;The recent wave of exploitation is related to CVE-53770, which is a patch bypass for CVE-2025-47704\6. The original vulnerabillity was reported as part of TrendMicro's Zeroday initiative in May in a contest called Pwn2Own. The name ToolShell is from them.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H4&gt;Q:&amp;nbsp;Can we check with ERM if our SharePoint is exposed?&lt;/H4&gt;
&lt;P&gt;A: Yes, absolutely&lt;/P&gt;
&lt;H4&gt;Q: When did Check Point release the IPS protection signature?&lt;/H4&gt;
&lt;P&gt;A: It was originally released on July 21 and then updated on July 23.&lt;/P&gt;
&lt;H4&gt;Q: You mentioned Harmony Endpoint Client as part of protective measures. Which versions of Microsoft Servers are supported with it?&lt;/H4&gt;
&lt;P&gt;A:&amp;nbsp;CURRENTLY SUPPORTED versions of the client will run on:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Windows Server 2012&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Windows Server 2012 R2&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Windows Server 2016&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Windows Server 2019&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Windows Server 2022&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 25 Jul 2025 07:35:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inside-the-SharePoint-Zero-Day-CVE-2025-53770-What-It-Means-and/m-p/253896#M42638</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-07-25T07:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Inside the SharePoint Zero-Day (CVE-2025-53770): What It Means and How to Stay Protected - Mater</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inside-the-SharePoint-Zero-Day-CVE-2025-53770-What-It-Means-and/m-p/253902#M42640</link>
      <description>&lt;P&gt;Very informative.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 16:36:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inside-the-SharePoint-Zero-Day-CVE-2025-53770-What-It-Means-and/m-p/253902#M42640</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-24T16:36:18Z</dc:date>
    </item>
  </channel>
</rss>

