25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Microsoft Issues Emergency Patches for Actively Exploited SharePoint Server Vulnerabilities

Microsoft has released emergency patches to fix two actively exploited zero-day vulnerabilities in Microsoft SharePoint Server. The two vulnerabilities are tracked as CVE-2025-53770 and CVE-2025-53771.  CVE-2025-53770 is a critical remote code execution vulnerability due to the deserialization of untrusted data in on-premise versions of Microsoft SharePoint Server, and has a CVSS v3.1 base score of 9.8. CVE-2025-53771 is a medium-severity server spoofing vulnerability due to improper limitation of a pathname to a restricted directory and has a CVSS v3.1 base score of 6.3.

The attack chain exploiting the vulnerabilities has been dubbed ToolShell, and allows an attacker to fully access SharePoint content, including file systems, configurations, and execute arbitrary code over the network. According to Microsoft, the vulnerabilities are related to CVE-2025-49704 and CVE-2025-49706, which were addressed in the July 2025 Patch Tuesday updates. “The update for CVE-2025-53770 includes more robust protections than the update for CVE-2025-49704,” explained Microsoft. “The update for CVE-2025-53771 includes more robust protections than the update for CVE-2025-49706.

The vulnerabilities have been addressed in the following versions:

  • Microsoft SharePoint Server 2019 Core KB5002754
  • Microsoft SharePoint Server Subscription Edition KB5002768
  • The patch for Microsoft SharePoint Enterprise Server 2016 is currently being tested.

Eye Security was the first to identify large-scale exploitation activity on July 18, 2025, which continued over the weekend as attackers attempted to exploit the vulnerabilities before patches were applied. Eye Security identified dozens of compromised SharePoint servers that had a shell planted which leaked sensitive data and enabled complete remote access. Vicims include federal and state agencies, universities, and energy companies.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

“Anybody who’s got a hosted SharePoint server has got a problem,” said Adam Meyers, senior vice president, CrowdStrike. “It’s a significant vulnerability.’’ The Cybersecurity and Infrastructure Security Agency (CISA) has advised all organizations with on-premise SharePoint servers to implement mitigations immediately or temporarily disconnect the servers from the public Internet.

Due to mass exploitation of the flaw, all organizations should assume that their SharePoint systems have been compromised if they were exposed to the Internet before the patch was applied. In addition to patching, cryptographic keys should be rotated, and investigations should be initiated to look for indicators of compromise. CVE-2025-53770 has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, and federal civilian agencies are required to apply mitigations immediately. Recommended mitigations and Indicators of Compromise (IoCs) are provided in the CISA alert.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist