<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 🚨 New Critical CVE Alert - Protect Your Network in Minutes with Playblocks AI Customization in Playblocks</title>
    <link>https://community.checkpoint.com/t5/Playblocks/New-Critical-CVE-Alert-Protect-Your-Network-in-Minutes-with/m-p/253824#M68</link>
    <description>&lt;P&gt;&lt;FONT color="#000000"&gt;A new &lt;STRONG&gt;critical zero-day vulnerability&lt;/STRONG&gt; in SharePoint,&lt;STRONG&gt; CVE-2025-53770&lt;/STRONG&gt;, also known as &lt;STRONG&gt;ToolShell&lt;/STRONG&gt;, is being &lt;STRONG&gt;actively exploited right now&lt;/STRONG&gt;.&amp;nbsp;If your organization uses &lt;STRONG&gt;SharePoint on-premises&lt;/STRONG&gt;, taking action is &lt;STRONG&gt;crucial&lt;/STRONG&gt;.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Published on &lt;STRONG&gt;July 21, 2025&lt;/STRONG&gt;, this vulnerability affects:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT color="#000000"&gt;Microsoft SharePoint Enterprise Server 2016&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#000000"&gt;Microsoft SharePoint Server 2019&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#000000"&gt;Microsoft SharePoint Server subscription (prior to 16.0.18526.20424)&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt; Microsoft SharePoint Server Insecure Deserialization (CVE-2025-49704; CVE-2025-53770)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;This vulnerability allows &lt;STRONG&gt;unauthenticated remote code execution&lt;/STRONG&gt; via insecure deserialization — giving attackers full control over affected systems.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":ballot_box_with_check:"&gt;☑️&lt;/span&gt;&lt;FONT color="#000000"&gt; &lt;STRONG data-start="1165" data-end="1210"&gt;Make sure your IPS signatures are updated&lt;/STRONG&gt; to detect this threat using the latest protections.&lt;/FONT&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;&lt;span class="lia-unicode-emoji" title=":direct_hit:"&gt;🎯&lt;/span&gt; The good news? You can stay protected in just minutes with Infinity Playblocks.&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Once detected by IPS, Infinity Playblocks allows you to instantly automate the response - blocking the source IP and &lt;FONT color="#000000"&gt;sending alerts in real time.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt;&lt;FONT color="#000000"&gt; Simply enter this prompt into the AI Automation Creator:&lt;/FONT&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;&lt;EM&gt;"Create an automation that blocks IPS attacks with protection name ״Microsoft SharePoint Server Insecure Deserialization״ and sends a notification about the event."&lt;/EM&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;Playblocks will instantly generate a complete automation - like the one below - that automatically blocks the attacker as soon as an exploit attempt is detected,&amp;nbsp;across all your gateways with the Quantum Enforcement Connector enabled.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AI Customization.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31029iC431854E6F445586/image-size/large?v=v2&amp;amp;px=999" role="button" title="AI Customization.png" alt="AI Customization.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Microsoft SharePoint Server Insecure Deserialization.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31028i9A264BDC8C864AAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Microsoft SharePoint Server Insecure Deserialization.png" alt="Microsoft SharePoint Server Insecure Deserialization.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&lt;BR /&gt;&lt;STRONG&gt;From detection to action - all in seconds.&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;#CheckPoint #InfinityPlayblocks #CVE2025 #ToolShell #Automation #SharePoint #ZeroDayProtection #CyberSecurity #AI&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jul 2025 21:14:17 GMT</pubDate>
    <dc:creator>Tal_Ben_Bassat</dc:creator>
    <dc:date>2025-07-23T21:14:17Z</dc:date>
    <item>
      <title>🚨 New Critical CVE Alert - Protect Your Network in Minutes with Playblocks AI Customization</title>
      <link>https://community.checkpoint.com/t5/Playblocks/New-Critical-CVE-Alert-Protect-Your-Network-in-Minutes-with/m-p/253824#M68</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;A new &lt;STRONG&gt;critical zero-day vulnerability&lt;/STRONG&gt; in SharePoint,&lt;STRONG&gt; CVE-2025-53770&lt;/STRONG&gt;, also known as &lt;STRONG&gt;ToolShell&lt;/STRONG&gt;, is being &lt;STRONG&gt;actively exploited right now&lt;/STRONG&gt;.&amp;nbsp;If your organization uses &lt;STRONG&gt;SharePoint on-premises&lt;/STRONG&gt;, taking action is &lt;STRONG&gt;crucial&lt;/STRONG&gt;.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Published on &lt;STRONG&gt;July 21, 2025&lt;/STRONG&gt;, this vulnerability affects:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT color="#000000"&gt;Microsoft SharePoint Enterprise Server 2016&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#000000"&gt;Microsoft SharePoint Server 2019&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#000000"&gt;Microsoft SharePoint Server subscription (prior to 16.0.18526.20424)&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt; Microsoft SharePoint Server Insecure Deserialization (CVE-2025-49704; CVE-2025-53770)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;This vulnerability allows &lt;STRONG&gt;unauthenticated remote code execution&lt;/STRONG&gt; via insecure deserialization — giving attackers full control over affected systems.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":ballot_box_with_check:"&gt;☑️&lt;/span&gt;&lt;FONT color="#000000"&gt; &lt;STRONG data-start="1165" data-end="1210"&gt;Make sure your IPS signatures are updated&lt;/STRONG&gt; to detect this threat using the latest protections.&lt;/FONT&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;&lt;span class="lia-unicode-emoji" title=":direct_hit:"&gt;🎯&lt;/span&gt; The good news? You can stay protected in just minutes with Infinity Playblocks.&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Once detected by IPS, Infinity Playblocks allows you to instantly automate the response - blocking the source IP and &lt;FONT color="#000000"&gt;sending alerts in real time.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_right:"&gt;👉&lt;/span&gt;&lt;FONT color="#000000"&gt; Simply enter this prompt into the AI Automation Creator:&lt;/FONT&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;&lt;EM&gt;"Create an automation that blocks IPS attacks with protection name ״Microsoft SharePoint Server Insecure Deserialization״ and sends a notification about the event."&lt;/EM&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;Playblocks will instantly generate a complete automation - like the one below - that automatically blocks the attacker as soon as an exploit attempt is detected,&amp;nbsp;across all your gateways with the Quantum Enforcement Connector enabled.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AI Customization.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31029iC431854E6F445586/image-size/large?v=v2&amp;amp;px=999" role="button" title="AI Customization.png" alt="AI Customization.png" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Microsoft SharePoint Server Insecure Deserialization.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31028i9A264BDC8C864AAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Microsoft SharePoint Server Insecure Deserialization.png" alt="Microsoft SharePoint Server Insecure Deserialization.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&lt;BR /&gt;&lt;STRONG&gt;From detection to action - all in seconds.&amp;nbsp;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;#CheckPoint #InfinityPlayblocks #CVE2025 #ToolShell #Automation #SharePoint #ZeroDayProtection #CyberSecurity #AI&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 21:14:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Playblocks/New-Critical-CVE-Alert-Protect-Your-Network-in-Minutes-with/m-p/253824#M68</guid>
      <dc:creator>Tal_Ben_Bassat</dc:creator>
      <dc:date>2025-07-23T21:14:17Z</dc:date>
    </item>
  </channel>
</rss>

