Navigate-IT: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) released an updated alert to reflect newly released information from Microsoft, and to correct the actively exploited Common Vulnerabilities and Exposures (CVEs), which have been confirmed as  CVE-2025-49706 , a network spoofing vulnerability, and CVE-2025-49704, a remote code execution (RCE) vulnerability.

CISA is aware of active exploitation of a spoofing and RCE vulnerability chain involving CVE-2025-49706 and CVE-2025-49704, enabling unauthorized access to on-premise SharePoint servers. While the scope and impact continue to be assessed, the chain, publicly reported as ToolShell, provides unauthenticated access to systems and authenticated access through network spoofing, respectively, and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network.

While not actively exploited, Microsoft has identified the following new CVEs that pose a potential risk:

What You Should Do

If you have questions or need assistance, contact a member of the Admiral team.

 

Used with permission from Article Aggregator