There is a new exploit and what the heck am I going to do now? If you run Microsoft SharePoint on-premise, you’re not alone in asking that question. A critical zero-day vulnerability is being exploited right now, and thousands of organizations are already affected.
The recently disclosed SharePoint vulnerability, CVE 2025 53770, is a case study in everything we pretend we’ve solved in cybersecurity but haven’t. It wasn’t elegant. It wasn’t targeted. It wasn’t even a new idea. But it worked against thousands of systems. And it hit us where we’re weakest: legacy platforms we never quite finished migrating, integrated services we don’t fully control, and assumptions about trust that haven’t held up.
This vulnerability, critical with a CVSS score of 9.8, targets Microsoft SharePoint servers hosted on-premises. It allows remote, unauthenticated attackers to deserialize untrusted data, execute code, steal cryptographic keys, impersonate services, and in some cases, persist even after a patch is applied. If your SharePoint box faced the internet in July 2025, you should assume it’s compromised. The attack surface was as wide as it was predictable, and it only reinforced what we already knew or should have known about monocultures, third-party risk, and the brittle sprawl of our interdependent systems.
Let’s start with what happened. Eye Security, a European firm, identified the exploit over the weekend of July 19 to 21. By that Sunday, Microsoft and CISA had issued alerts. The FBI confirmed active investigation. And every serious enterprise security team found themselves digging into logs, checking Shodan, and realizing their supposedly segmented internal tools were bleeding data.
The vulnerability was already under attack when it was disclosed. Exploits targeted at least 50 known systems in the first wave, but estimates put potentially vulnerable systems in the range of 8,000 to 10,000 publicly exposed SharePoint servers. That doesn’t count internal systems behind perimeter defenses, nor hybrid deployments bridging on-prem and cloud.
This wasn’t a sophisticated campaign. Researchers observed the same payload sprayed across targets. The goal wasn’t stealth. It was saturation. Find exposed systems, execute code, extract keys, and move laterally or persist. In many cases, attackers deployed backdoors or modified SharePoint components in ways that survived patches and reboots. The assumption that patching would be enough turned out to be wrong.
And this wasn’t just a Microsoft problem. SharePoint rarely lives alone. It connects to Teams, OneDrive, Outlook, and third-party tools. A compromise here meant a potential pivot into email systems, identity providers, document repositories, and line-of-business applications. That’s where the monoculture concern gets real. Dan Geer warned us about this over 20 years ago, that when one vendor dominates an ecosystem, a single exploit becomes systemic. And here we are.
While SharePoint Online (Microsoft 365) remained unaffected, many organizations especially in the public sector and regulated industries still rely on on-prem installations. Those installations, in many cases, weren’t fully patched or isolated. And the integration points between on-prem SharePoint and cloud services made clean separation difficult. This wasn’t a matter of old servers sitting in the corner. It was active infrastructure, critical to operations, trusted implicitly by everything else.
The incident response guidance came quickly. CISA urged organizations to isolate affected systems, enable AMSI integration, deploy Defender AV, rotate digital keys, and treat their systems as compromised. Microsoft, for its part, issued patches for newer SharePoint versions and promised updates for older ones. But guidance alone isn’t enough. This exploit laid bare how slowly some organizations can move, how tangled their architectures have become, and how fragile trust has turned out to be.
Applying the NIST incident response lifecycle helps frame what this moment demands.
Prepare: Inventory remains foundational. Organizations that didn’t know where SharePoint lived or assumed it was isolated were flying blind. Asset management, credential lifecycle, key rotation policies, and exposure controls should already be in place. The absence of these made response efforts chaotic.
Identify: The attack patterns were noisy if you knew what to look for. Suspicious w3wp.exe behavior launching cmd.exe with base64 encoded PowerShell payloads was a clear signal. But detection required logging depth, alerting rules, and analysts trained to investigate encoded commands. Many teams didn’t have that or were overwhelmed.
Contain: Disconnection from the internet was the nuclear option, but in many cases, it was necessary. Some organizations simply couldn’t do it. Others pulled the plug and initiated full rebuilds. Containment also meant revoking compromised credentials, segmenting impacted networks, and disabling trust relationships with affected systems.
Eradicate: Patching alone wasn’t enough. The persistence mechanisms included modified components and unauthorized services. Eradication required a full sweep, file integrity checks, forensic review, and in some cases, complete redeployment from clean backups.
Recover: This phase is where the real work begins. Systems were brought back online under tightened access controls, new keys, rotated service accounts, and hardened perimeter rules. But the challenge extended beyond technical controls. Communications, compliance, stakeholder management, and postmortem documentation all came into play.
Lessons Learned: This is where organizations have the chance to evolve. Many found that their incident response plans didn’t account for key theft. Or that their logging stopped at the perimeter. Or that their third-party hosting provider hadn’t patched at all. SharePoint wasn’t the root of the problem. The root was architectural drift and over-trust in a brittle ecosystem.
Which brings us to third-party risk. This wasn’t just about internal infrastructure. Many affected systems were hosted, managed, or integrated by third parties. And many organizations didn’t even know it. The shared responsibility model broke down when providers failed to patch or notify their clients. Accountability was scattered. And trust, once lost, wasn’t easily rebuilt.
The monoculture of Microsoft in enterprise environments amplified the blast radius. When SharePoint goes down, so does integrated collaboration, document workflow, access control delegation, and in many cases, business continuity. When keys get stolen, impersonation spreads beyond a single service. That lateral risk makes containment exponentially harder.
If this feels familiar, it should. The Hafnium attacks in 2021 used a similar approach against Exchange. The 2023 key theft incident hit Microsoft’s cloud identity systems. The SolarWinds compromise showed how a trusted software update could become a vector. Each of these highlighted different pieces of the same underlying problem: concentrated risk in critical vendors with deep integration across systems.
So where does this go from here? The exploit will evolve. Copycats will emerge. Some organizations have been compromised but don’t know it yet. Others will assume patching fixed everything and move on without checking for persistence. And if attackers used the stolen keys to access adjacent systems, we’ll be cleaning this up for months.
This isn’t just a SharePoint story. It’s a reminder that we don’t control our environments as much as we think we do. That trust, once established between services, becomes a liability when compromised. And that the tools we depend on most are often the ones we scrutinize the least.
For technical and policy leaders, this is a moment to step back. Not just to fix what’s broken, but to rethink what secure architecture means in a world of deep integration and shallow control. Inventory must go beyond assets to include trust relationships. Contracts with third parties must have teeth for incident response, transparency, and patch timelines. And monocultures must be challenged, not with silver bullets, but with thoughtful diversification of platforms and controls.
The SharePoint vulnerability may fade from the headlines. But its lessons shouldn’t. We were warned. We weren’t ready. Let’s not waste the clarity it gave us.
Footnotes
- Microsoft Security Response Center. “Customer Guidance for SharePoint Vulnerability CVE-2025-53770.” https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770
- CISA. “Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability CVE-2025-53770.” https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770
- Eye Security. “SharePoint Under Siege: CVE-2025-53770 Technical Analysis and Exploitation.” https://research.eye.security/sharepoint-under-siege/
- The Record by Recorded Future. “Microsoft SharePoint Zero-Day Vulnerability Exploited Globally.” https://therecord.media/microsoft-sharepoint-zero-day-vulnerability-exploited-globally
- BleepingComputer. “Microsoft SharePoint Zero-Day Exploited in RCE Attacks, No Patch Available.” https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available
- Bloomberg. “Hackers Exploit Microsoft SharePoint as Firm Works to Patch.” https://www.bloomberg.com/news/articles/2025-07-21/hackers-exploit-microsoft-sharepoint-as-firm-works-to-patch
- CNBC. “Microsoft Hit with SharePoint Attack Affecting Global Businesses and Governments.” https://www.cnbc.com/2025/07/21/microsoft-hit-with-sharepoint-attack-affecting-global-businesses-and-governments.html
- NIST. “CVE-2025-53770 Vulnerability Summary and Mitigation.” https://nvd.nist.gov/vuln/detail/CVE-2025-53770
- ProPublica/Reuters. Coverage on Microsoft’s prior use of China-based engineers and policy concerns.
- Dan Geer. “Cybersecurity and the Monoculture Threat.” USENIX and related publications.