We would like to draw your attention to a currently exploited security vulnerability in Microsoft SharePoint , which poses considerable risks for systems operated exclusively locally (“on-premises”).
The U.S. cybersecurity agency CISA and Microsoft itself report active attacks on systems that exploit the CVE-2025-53770 vulnerability – also known as “ToolShell”. Below you will find an overview of the incident as well as concrete measures you can take to secure your systems.
What happened?
The CVE-2025-53770 vulnerability allows attackers to access SharePoint servers without logging in (“unauthenticated”) and to execute arbitrary code over the network (= RCE → Remote Code Execution). It is a variant of the already known CVE-2025-49706 vulnerability and is based on faulty deserialization – a technical process in which data is converted into a readable format. If this is insufficiently secured, malicious code can be introduced and executed.
The attackers can gain complete access to the server and then to the infrastructure behind it, including file storage, configuration, and sensitive content. The incident only affects local SharePoint installations – SharePoint Online (Microsoft 365) is not affected, according to Microsoft.
What is affected?
The vulnerability only affects companies that operate Microsoft SharePoint locally (on-premises).
Specifically, the following versions are at risk:
The cloud version SharePoint Online, which runs on Microsoft 365, is not affected.
The situation is particularly critical if affected servers are directly accessible via the Internet and important protective measures or updates are missing.
How can I protect myself?
IT managers should check the following attack patterns in particular: