Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Microsoft Releases Emergency Patches for SharePoint Vulnerabilities

Microsoft Releases Emergency Patches for SharePoint Vulnerabilities

by Tekmono Editorial Team
21/07/2025
in News
Share on FacebookShare on Twitter

Microsoft has issued urgent security patches for two zero-day vulnerabilities, CVE-2025-53770 and CVE-2025-53771, affecting Microsoft SharePoint, which have been actively exploited in “ToolShell” attacks globally, impacting over 54 organizations.

The vulnerabilities emerged after threat actors bypassed fixes released in the July Patch Tuesday updates. These initial updates were intended to address a “ToolShell” zero-day vulnerability chain that allowed remote code execution in Microsoft SharePoint, first demonstrated at the Pwn2Own contest in Berlin in May.

Microsoft has quickly released out-of-band security updates for Microsoft SharePoint Subscription Edition and SharePoint 2019 to mitigate CVE-2025-53770 and CVE-2025-53771. The company confirmed that these new updates offer “more robust protections” compared to the previous fixes for CVE-2025-49704 and CVE-2025-49706, respectively. An update for Microsoft SharePoint Enterprise Server 2016 is still pending.

Related Reads

Apple Unveils iPhone 17e Starting at $599

Honor Launches Thinner Magic V6 Foldable Phone

Trump Orders Immediate Halt to Anthropic AI Use

Claude AI Suffers Partial Service Disruption on March 2

SharePoint administrators are strongly advised to install these critical updates immediately: KB5002754 for Microsoft SharePoint Server 2019 and KB5002768 for Microsoft SharePoint Subscription Edition.

Beyond applying the patches, Microsoft urges administrators to rotate their SharePoint machine keys. This can be done either manually via PowerShell using the Update-SPMachineKey cmdlet or through Central Admin by triggering the “Machine Key Rotation Job” timer job. After rotation, an IIS reset (iisreset.exe) on all SharePoint servers is recommended.

Admins should also conduct a thorough analysis of their logs and file systems for signs of compromise or exploitation attempts. Key indicators include the creation of the file C:PROGRA~1COMMON~1MICROS~1WEBSER~116TEMPLATELAYOUTSspinstall0.aspx, and IIS logs showing a POST request to _layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx with an HTTP referrer of _layouts/SignOut.aspx.

Microsoft has provided a Microsoft 365 Defender query to help detect the presence of the spinstall0.aspx file:

DeviceFileEvents
| where FolderPath has "MICROS~1\WEBSER~1\16\TEMPLATE\LAYOUTS"
| where FileName =~ "spinstall0.aspx"
or FileName has "spinstall0"
| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine, FileName, FolderPath, ReportId, ActionType, SHA256
| order by Timestamp desc

If this file is found, a comprehensive investigation of the affected server and network is crucial to ensure that threat actors have not expanded their access to other devices.

ShareTweet

You Might Be Interested

Apple Unveils iPhone 17e Starting at 9
News

Apple Unveils iPhone 17e Starting at $599

02/03/2026
Honor Launches Thinner Magic V6 Foldable Phone
News

Honor Launches Thinner Magic V6 Foldable Phone

02/03/2026
Trump Orders Immediate Halt to Anthropic AI Use
News

Trump Orders Immediate Halt to Anthropic AI Use

02/03/2026
Claude AI Suffers Partial Service Disruption on March 2
News

Claude AI Suffers Partial Service Disruption on March 2

02/03/2026
Please login to join discussion

Recent Posts

  • Apple Unveils iPhone 17e Starting at $599
  • Honor Launches Thinner Magic V6 Foldable Phone
  • Trump Orders Immediate Halt to Anthropic AI Use
  • Claude AI Suffers Partial Service Disruption on March 2
  • Claude Chatbot Overtakes ChatGPT in US App Store

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals