Microsoft SharePoint Zero-Day
Chinese hackers are exploiting a high-severity vulnerability in Microsoft SharePoint to steal data worldwide:
The vulnerability, tracked as CVE-2025-53770, carries a severity rating of 9.8 out of a possible 10. It gives unauthenticated remote access to SharePoint Servers exposed to the Internet. Starting Friday, researchers began warning of active exploitation of the vulnerability, which affects SharePoint Servers that infrastructure customers run in-house. Microsoft’s cloud-hosted SharePoint Online and Microsoft 365 are not affected.
Here’s Microsoft on patching instructions. Patching isn’t enough, as attackers have used the vulnerability to steal authentication credentials. It’s an absolute mess. CISA has more information. Also these four links. Two Slashdot threads.
This is an unfolding security mess, and quite the hacking coup.
Subscribe to comments on this entry
Clive Robinson • July 28, 2025 10:09 AM
@ Bruce,
With regards,
You don’t make it clear if you mean this particular Microsoft Product, or Microsoft’s software production in general…
Recent attacks have happened on a severity of 9 or greater due to a myriad of failures in the way Microsoft design, prototype, produce, and support software.
In one case Microsoft trying to fix one fault, showed crackers –we presume from reverse engineering the Microsoft issued patch– how to find and exploit similar flaws in around a day…
The fact these attacks are being found, exploits created and put into action in such a short period of time seriously suggests that Microsoft and similar need to review the way they go about things.
Further, even though Current AI LLM and ML systems are fairly bad with software, they are compared to humans incredibly fast.
It is the nature of attack progress and software development that the direction is forward. Thus we can only expect Current AI performance with analysing and developing software to “improve”.
Thus it may not be long before “patch to fielded attack” is measured in minutes not hours.