Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53771 (GCVE-0-2025-53771)
Vulnerability from cvelistv5 – Published: 2025-07-20 22:16 – Updated: 2026-02-13 19:07- CWE-287 - Improper Authentication
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Microsoft | Microsoft SharePoint Enterprise Server 2016 |
Affected:
16.0.0 , < 16.0.5513.1001
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-07-20T23:40:49.866Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/"
}
],
"title": "CVE Program Container",
"x_generator": {
"engine": "ADPogram 0.0.1"
}
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53771",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T16:22:50.530428Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T16:22:55.361Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"x64-based Systems"
],
"product": "Microsoft SharePoint Enterprise Server 2016",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.0.5513.1001",
"status": "affected",
"version": "16.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Microsoft SharePoint Server 2019",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.0.10417.20037",
"status": "affected",
"version": "16.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Microsoft SharePoint Server Subscription Edition",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.0.18526.20508",
"status": "affected",
"version": "16.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "16.0.5513.1001",
"versionStartIncluding": "16.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.0.10417.20037",
"versionStartIncluding": "16.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*",
"versionEndExcluding": "16.0.18526.20508",
"versionStartIncluding": "16.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-07-20T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287: Improper Authentication",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T19:07:03.835Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Microsoft SharePoint Server Spoofing Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
}
],
"title": "Microsoft SharePoint Server Spoofing Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-53771",
"datePublished": "2025-07-20T22:16:52.203Z",
"dateReserved": "2025-07-09T13:25:25.501Z",
"dateUpdated": "2026-02-13T19:07:03.835Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53771\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-07-20T23:15:31.807\",\"lastModified\":\"2025-08-14T17:29:05.870\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.\"},{\"lang\":\"es\",\"value\":\"La limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\u0027path traversal\u0027) en Microsoft Office SharePoint permite que un atacante autorizado realice suplantaci\u00f3n de identidad a trav\u00e9s de una red.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*\",\"versionEndExcluding\":\"16.0.18526.20508\",\"matchCriteriaId\":\"E1677A89-14A2-496E-A2EB-387B1BFE876C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"F815EF1D-7B60-47BE-9AC2-2548F99F10E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6122D014-5BF1-4AF4-8B4D-80205ED7785E\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/\"}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-07-20T23:40:49.866Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53771\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-23T16:22:50.530428Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-21T12:41:24.896Z\"}}], \"cna\": {\"title\": \"Microsoft SharePoint Server Spoofing Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Microsoft SharePoint Enterprise Server 2016\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.0.0\", \"lessThan\": \"16.0.5513.1001\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft SharePoint Server 2019\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.0.0\", \"lessThan\": \"16.0.10417.20037\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft SharePoint Server Subscription Edition\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.0.0\", \"lessThan\": \"16.0.18526.20508\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}], \"datePublic\": \"2025-07-20T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771\", \"name\": \"Microsoft SharePoint Server Spoofing Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287: Improper Authentication\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"16.0.5513.1001\", \"versionStartIncluding\": \"16.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"16.0.10417.20037\", \"versionStartIncluding\": \"16.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"16.0.18526.20508\", \"versionStartIncluding\": \"16.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-08-18T17:50:52.982Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53771\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-18T17:50:52.982Z\", \"dateReserved\": \"2025-07-09T13:25:25.501Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-07-20T22:16:52.203Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2025-53771
Vulnerability from fkie_nvd - Published: 2025-07-20 23:15 - Updated: 2025-08-14 17:29| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | sharepoint_server | * | |
| microsoft | sharepoint_server | 2016 | |
| microsoft | sharepoint_server | 2019 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*",
"matchCriteriaId": "E1677A89-14A2-496E-A2EB-387B1BFE876C",
"versionEndExcluding": "16.0.18526.20508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network."
},
{
"lang": "es",
"value": "La limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\u0027path traversal\u0027) en Microsoft Office SharePoint permite que un atacante autorizado realice suplantaci\u00f3n de identidad a trav\u00e9s de una red."
}
],
"id": "CVE-2025-53771",
"lastModified": "2025-08-14T17:29:05.870",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2025-07-20T23:15:31.807",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
],
"url": "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
NCSC-2025-0233
Vulnerability from csaf_ncscnl - Published: 2025-07-20 08:34 - Updated: 2025-07-23 15:31Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft informatie vrijgegeven over actief misbruikte zeroday-kwetsbaarheden in on-premises versies van Microsoft SharePoint Server. Sharepoint Online (onderdeel van Microsoft 365) is niet getroffen.",
"title": "Feiten"
},
{
"category": "description",
"text": "De zeroday-kwetsbaarheden, met kenmerk CVE-2025-53770 en CVE-2025-53771, stellen een kwaadwillende in staat om willekeurige code uit te voeren op SharePoint Server-systemen. Kwaadwillenden kunnen op deze manier toegang krijgen tot gevoelige gegevens of verdere aanvallen op het netwerk van het slachtoffer uitvoeren.\n\nHet NCSC heeft signalen ontvangen dat de kwetsbaarheden actief worden misbruikt. Naast Microsoft heeft onder andere beveiligingsbedrijf Eye Security hier op hun website over bericht. Tevens is proof-of-conceptcode (PoC) gepubliceerd waarmee de kwetsbaarheid met kenmerk CVE-2025-53770 kan worden misbruikt. Het NCSC heeft de werking van dit PoC niet geverifieerd, maar acht het aannemelijk dat het PoC functioneel is. Het is daarom de verwachting dat het aantal pogingen tot misbruik verder toeneemt.\n\nDe kwetsbaarheden zijn varianten van de eerder actief misbruikte kwetsbaarheden CVE-2025-49704 en CVE-2025-49706. Voor deze kwetsbaarheden heeft het NCSC beveiligingsadvies NCSC-2025-0215 uitgebracht, waarvoor op 19 juli een update is verschenen met kans en inschaling HIGH/HIGH.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft beveiligingsupdates uitgebracht voor SharePoint Server 2016, SharePoint Server 2019 en SharePoint Server Subscription Edition. Het NCSC adviseert dringend om de updates zo snel mogelijk te installeren. Op de website van Microsoft lees je hoe je dit doet. Let er hierbij op dat je je ASP.net-machinekeys roteert nadat je de updates hebt ge\u00efnstalleerd. Dit voorkomt dat een kwaadwillende eventuele eerder buitgemaakte machinekeys in de toekomst kan misbruiken en op die manier toegang tot de SharePoint-omgeving houdt.\n\nIndien het niet mogelijk is om de beveiligingsupdates te installeren op de manier die Microsoft voorschrijft, adviseert het NCSC om de mitigerende maatregelen toe te passen zoals uitgelegd op de website van Microsoft. Let er ook hierbij op dat je je machinekeys roteert. Als het ook niet mogelijk is om de mitigerende maatregelen toe te passen, adviseert het NCSC om de SharePoint-omgeving tijdelijk los te koppelen van het internet totdat de beveiliginsgupdates op de juiste wijze zijn uitgevoerd.\n\nNaast het installeren van de beveiligingsupdates, is het raadzaam om je SharePont-omgeving en netwerklogs op aanwezigheid van indicators-of-compromise (IOC\u0027s) te controleren. Hiermee kun je bepalen of je systeem mogelijk is gecompromitteerd. Verschillende cybersecuritybedrijven hebben IOC\u0027s gedeeld. Kijk in je netwerklogs of er netwerkverbindingen met de genoemde IP-adressen zijn opgezet, en controleer op je SharePoint-systeem of de genoemde malafide bestanden aanwezig zijn. IOC\u0027s zijn onder andere op de volgende websites te vinden:\n\n- https://research.eye.security/sharepoint-under-siege/\n- https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/\n- https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/\n- https://www.bitdefender.com/en-us/blog/businessinsights/bitdefender-advisory-rce-vulnerability-microsoft-sharepoint-server-cve-2025-53770ce\n\nZie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "high",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Neutralization",
"title": "CWE-707"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - certbundde; cisagov; cveprojectv5; nvd",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"category": "external",
"summary": "Reference - certbundde; cisagov; cveprojectv5; ncscclear; nvd",
"url": "https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://learn.microsoft.com/en-us/sharepoint/security-for-sharepoint-server/configure-amsi-integration"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; ncscclear; nvd",
"url": "https://research.eye.security/sharepoint-under-siege/"
}
],
"title": "Zeroday-kwetsbaarheden ontdekt in Microsoft SharePoint Server",
"tracking": {
"current_release_date": "2025-07-23T15:31:20.529389Z",
"generator": {
"date": "2025-06-05T14:45:00Z",
"engine": {
"name": "V.A.",
"version": "1.1"
}
},
"id": "NCSC-2025-0233",
"initial_release_date": "2025-07-20T08:34:22.645952Z",
"revision_history": [
{
"date": "2025-07-20T08:34:22.645952Z",
"number": "1.0.0",
"summary": "Initiele versie"
},
{
"date": "2025-07-21T09:46:59.357124Z",
"number": "1.0.1",
"summary": "Microsoft heeft beveiligingsupdates beschikbaar gesteld om de kwetsbaarheden te verhelpen in SharePoint Server Subscription Service en SharePoint Server 2019. Voor SharePoint Server 2016 zijn vooralsnog geen beveiligingsupdates beschikbaar. Lees het handelingsperspectief voor meer informatie. Daarnaast is een ontbrekende CVE (CVE-2025-53771) en is informatie over actief misbruik aan dit beveiligingsadvies toegevoegd."
},
{
"date": "2025-07-22T07:24:46.541418Z",
"number": "1.0.2",
"summary": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen in SharePoint Server 2016. Daarnaast is mogelijk proof-of-conceptcode op het internet verschenen waarmee de kwetsbaarheid met kenmerk CVE-2025-53770 kan worden misbruikt."
},
{
"date": "2025-07-23T15:31:20.529389Z",
"number": "1.0.3",
"summary": "Verschillende cybersecuritybedrijven hebben Indicators-of-Compromise gedeeld die organisaties kunnen gebruiken om misbruik van de kwetsbaarheden te detecteren. Referenties naar deze Indicators-of-Compromise zijn aan het beveiligingsadvies toegevoegd. Daarnaast is aangegeven dat het NCSC ervan uitgaat dat de eerder vermelde proof-of-conceptcode functioneel is."
}
],
"status": "final",
"version": "1.0.3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1770545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Enterprise Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1770546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Server 2019"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1429583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Server Subscription Edition"
}
],
"category": "product_family",
"name": "Microsoft Office"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-2990034"
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Enterprise Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-2990035"
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Server 2019"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-2990036"
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Server Subscription Edition"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53770",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1770545",
"CSAFPID-2990034",
"CSAFPID-1770546",
"CSAFPID-2990035",
"CSAFPID-1429583",
"CSAFPID-2990036"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53770 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53770.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1770545",
"CSAFPID-2990034",
"CSAFPID-1770546",
"CSAFPID-2990035",
"CSAFPID-1429583",
"CSAFPID-2990036"
]
}
],
"title": "CVE-2025-53770"
},
{
"cve": "CVE-2025-53771",
"cwe": {
"id": "CWE-707",
"name": "Improper Neutralization"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization",
"title": "CWE-707"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1770545",
"CSAFPID-2990034",
"CSAFPID-1770546",
"CSAFPID-2990035",
"CSAFPID-1429583",
"CSAFPID-2990036"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53771 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53771.json"
}
],
"title": "CVE-2025-53771"
}
]
}
GHSA-6PMQ-337C-GV96
Vulnerability from github – Published: 2025-07-21 00:33 – Updated: 2025-07-21 00:33Improper limitation of a pathname to a restricted directory ('path traversal') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
{
"affected": [],
"aliases": [
"CVE-2025-53771"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-287"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-20T23:15:31Z",
"severity": "MODERATE"
},
"details": "Improper limitation of a pathname to a restricted directory (\u0027path traversal\u0027) in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.",
"id": "GHSA-6pmq-337c-gv96",
"modified": "2025-07-21T00:33:35Z",
"published": "2025-07-21T00:33:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53771"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"type": "WEB",
"url": "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1598
Vulnerability from csaf_certbund - Published: 2025-07-20 22:00 - Updated: 2025-07-21 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft Sharepoint ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u. a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Sharepoint Services ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u.a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer oder authentifizierter Angreifer kann mehrere Schwachstellen in Microsoft SharePoint Server 2019, Microsoft SharePoint Subscription Edition und Microsoft SharePoint Server 2016 ausnutzen, um beliebigen Code auszuf\u00fchren und Spoofing-Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1598 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1598.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1598 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1598"
},
{
"category": "external",
"summary": "Microsoft Update Guide CVE-2025-53770 vom 2025-07-20",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"category": "external",
"summary": "Microsoft Customer guidance for SharePoint vulnerability CVE-2025-53770 vom 2025-07-20",
"url": "https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/"
},
{
"category": "external",
"summary": "Canadian Centre for Cyber Security - Alert AL25-009 vom 2025-07-20",
"url": "https://cyber.gc.ca/en/alerts-advisories/al25-009-vulnerability-impacting-microsoft-sharepoint-server-cve-2025-53770"
},
{
"category": "external",
"summary": "Microsoft Update Guide CVE-2025-53771 vom 2025-07-20",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
}
],
"source_lang": "en-US",
"title": "Microsoft SharePoint (On-premises): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-21T22:00:00.000+00:00",
"generator": {
"date": "2025-07-22T05:16:53.056+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1598",
"initial_release_date": "2025-07-20T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-20T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "2",
"summary": "Vulname eingetragen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Subscription Edition \u003cKB5002768",
"product": {
"name": "Microsoft SharePoint Subscription Edition \u003cKB5002768",
"product_id": "T045519"
}
},
{
"category": "product_version",
"name": "Subscription Edition KB5002768",
"product": {
"name": "Microsoft SharePoint Subscription Edition KB5002768",
"product_id": "T045519-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint:subscription_edition__kb5002768"
}
}
}
],
"category": "product_name",
"name": "SharePoint"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft SharePoint Server 2016",
"product": {
"name": "Microsoft SharePoint Server 2016",
"product_id": "T045520",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint_server_2016:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003cKB5002744 Build 16.0.5508.1000",
"product": {
"name": "Microsoft SharePoint Server 2016 \u003cKB5002744 Build 16.0.5508.1000",
"product_id": "T045524"
}
},
{
"category": "product_version",
"name": "KB5002744 Build 16.0.5508.1000",
"product": {
"name": "Microsoft SharePoint Server 2016 KB5002744 Build 16.0.5508.1000",
"product_id": "T045524-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint_server_2016:kb5002744_build_16.0.5508.1000"
}
}
}
],
"category": "product_name",
"name": "SharePoint Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cKB5002754",
"product": {
"name": "Microsoft SharePoint Server 2019 \u003cKB5002754",
"product_id": "T045518"
}
},
{
"category": "product_version",
"name": "KB5002754",
"product": {
"name": "Microsoft SharePoint Server 2019 KB5002754",
"product_id": "T045518-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint_server_2019:kb5002754"
}
}
},
{
"category": "product_version_range",
"name": "\u003cKB5002741 Build 16.0.10417.20027",
"product": {
"name": "Microsoft SharePoint Server 2019 \u003cKB5002741 Build 16.0.10417.20027",
"product_id": "T045523"
}
},
{
"category": "product_version",
"name": "KB5002741 Build 16.0.10417.20027",
"product": {
"name": "Microsoft SharePoint Server 2019 KB5002741 Build 16.0.10417.20027",
"product_id": "T045523-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint_server_2019:kb5002741_build_16.0.10417.20027"
}
}
}
],
"category": "product_name",
"name": "SharePoint Server 2019"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53770",
"product_status": {
"known_affected": [
"T045523",
"T045524",
"T045518",
"T045519",
"T045520"
]
},
"release_date": "2025-07-20T22:00:00.000+00:00",
"title": "CVE-2025-53770"
},
{
"cve": "CVE-2025-53771",
"product_status": {
"known_affected": [
"T045523",
"T045524",
"T045520"
]
},
"release_date": "2025-07-20T22:00:00.000+00:00",
"title": "CVE-2025-53771"
}
]
}
CERTFR-2025-ALE-010
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 23 juillet 2025]
Le 20 juillet 2025, Microsoft a publié des correctifs pour une vulnérabilité de type limitation insuffisante d'un chemin d'accès à un répertoire restreint, aussi appelé path traversal, affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L'éditeur indique que la vulnérabilité CVE-2025-53771 permet à un attaquant de provoquer une usurpation d'identité sur un réseau.
[Mise à jour du 22 juillet 2025]
Microsoft a publié les mises à jour cumulatives (Cumulative Update, CU) de sécurité pour SharePoint Enterprise Server 2016. L'éditeur fournit également des marqueurs de compromission à rechercher [3].
[Publication initiale]
Le 19 juillet 2025, Microsoft a publié des correctifs pour une vulnérabilité de type jour-zéro affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L'éditeur indique que la vulnérabilité CVE-2025-53770 permet à un attaquant de provoquer une désérialisation de données non fiables entrainant une exécution de code arbitraire à distance.
Microsoft indique que la vulnérabilité CVE-2025-53770 est activement exploitée.
Pour limiter les attaques potentielles, l'éditeur a fait des recommandations [1].
Le CERT-FR recommande les actions suivantes : * si l'instance SharePoint est dans une version disposant d'un correctif pour cette vulnérabilité : * appliquer les dernières mises à jour de sécurité, y compris la mise à jour de sécurité de juillet 2025 ; * effectuer une rotation des clés de machine ASP.NET du SharePoint Server [2]; * redémarrer IIS sur tous les serveurs SharePoint. * si ça n'est pas le cas, déconnecter ou filtrer les accès à cette instance.
L'éditeur fournit des moyens de détection et de protection pour Microsoft Defender Antivirus [1].
Recherche de compromission
[Mise à jour du 23 juillet 2025]
Dès que le correctif est appliqué ou l’instance SharePoint isolée : * effectuer une recherche de compromission ; * rechercher dans les journaux réseau IIS SharePoint en privilégiant la période allant du 7 juillet 2025 jusqu'à la date d'application des correctifs de sécurité.
Les caractéristiques des requêtes HTTP sont décrites ci-dessous:
| Caractéristiques HTTP | Valeur(s) à rechercher |
|---|---|
| Méthode HTTP | POST |
| URL | /_layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx /_layouts/16/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx |
| Referer | /_layouts/SignOut.aspx https:// <cible>/_layouts/SignOut.aspx http:// <cible>/_layouts/SignOut.aspx |
<cible> étant le nom de domaine de votre SharePoint.
Si des journaux système sont disponibles, rechercher des processus inhabituels générés par le processus IIS w3wp.exe tels que powershell.exe ou cmd.exe.
En cas de compromission, signaler l’événement auprès du CERT-FR en mettant en copie vos éventuels CSIRTs métier et consulter les fiches réflexes de compromission système [4][5].
Le CERT-FR recommande de déterminer si l’instance SharePoint n’héberge pas des secrets d’administration du système d'information.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
[Mise à jour du 23 juillet 2025]
L'éditeur annonce que SharePoint Enterprise Server 2010 et SharePoint Enterprise Server 2013 ne recevront pas de correctifs de sécurité. Le CERT-FR recommande aux utilisateurs de migrer vers un produit disposant de mises à jours.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | SharePoint Enterprise Server 2016 | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5513.1001 | ||
| Microsoft | SharePoint Server 2019 | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20037 | ||
| Microsoft | SharePoint Server Subscription Edition | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20508 | ||
| Microsoft | SharePoint Enterprise Server 2013 | Microsoft SharePoint Enterprise Server 2013 toutes versions | ||
| Microsoft | SharePoint Enterprise Server 2010 | Microsoft SharePoint Enterprise Server 2010 toutes versions |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5513.1001",
"product": {
"name": "SharePoint Enterprise Server 2016",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20037",
"product": {
"name": "SharePoint Server 2019",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20508",
"product": {
"name": "SharePoint Server Subscription Edition",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2013 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2013",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2010 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2010",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "**\u003cspan class=\"important-content\"\u003e[Mise \u00e0 jour du 23 juillet 2025]\u003c/span\u003e**\n\nL\u0027\u00e9diteur annonce que SharePoint Enterprise Server 2010 et SharePoint Enterprise Server 2013 ne recevront pas de correctifs de s\u00e9curit\u00e9. Le CERT-FR recommande aux utilisateurs de migrer vers un produit disposant de mises \u00e0 jours.",
"closed_at": "2025-08-26",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53770"
},
{
"name": "CVE-2025-53771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53771"
}
],
"links": [
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Enterprise Server 2016 (KB5002760)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108288"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Server 2019 Core (KB5002754)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108286"
},
{
"title": "[1] Conseils aux clients pour la vuln\u00e9rabilit\u00e9 SharePoint CVE-2025-53770",
"url": "https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/"
},
{
"title": "Description de la mise \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 : 8 juillet 2025 (KB5002744)",
"url": "https://support.microsoft.com/fr-fr/topic/description-of-the-security-update-for-sharepoint-enterprise-server-2016-july-8-2025-kb5002744-9196e240-c76d-4bb0-b16c-6f7d6645a1f0"
},
{
"title": "[5] Compromission syst\u00e8me - Endiguement",
"url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2024-RFX-006/"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Enterprise Server 2016 Language Pack (KB5002759)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108289"
},
{
"title": "Description de la mise \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Server 2019 : 8 juillet 2025 (KB5002741)",
"url": "https://support.microsoft.com/fr-fr/topic/description-of-the-security-update-for-sharepoint-server-2019-july-8-2025-kb5002741-d860f51b-fcdf-41e4-89de-9ce487c06548"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Server Subscription Edition (KB5002768)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108285"
},
{
"title": "Avis CERT-FR CERTFR-2025-AVI-0611 du 21 juillet 2025",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0611/"
},
{
"title": "[4] Compromission syst\u00e8me - Qualification",
"url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2024-RFX-005/"
},
{
"title": "[2] Am\u00e9lioration de la s\u00e9curit\u00e9 de l\u0027\u00e9tat de ASP.NET et de la gestion des cl\u00e9s",
"url": "https://learn.microsoft.com/en-us/sharepoint/security-for-sharepoint-server/improved-asp-net-view-state-security-key-management"
},
{
"title": "[3] Pr\u00e9vention de l\u0027exploitation active des vuln\u00e9rabilit\u00e9s de SharePoint",
"url": "https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/"
}
],
"reference": "CERTFR-2025-ALE-010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-21T00:00:00.000000"
},
{
"description": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 et marqueurs de compromission disponibles. ",
"revision_date": "2025-07-22T00:00:00.000000"
},
{
"description": "Ajout de la r\u00e9f\u00e9rence CVE CVE-2025-53771, informations sur les produits obsol\u00e8tes et recherche de compromission",
"revision_date": "2025-07-23T00:00:00.000000"
},
{
"description": " Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2025-08-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "**\u003cspan class=\"important-content\"\u003e[Mise \u00e0 jour du 23 juillet 2025]\u003c/span\u003e**\n\nLe 20 juillet 2025, Microsoft a publi\u00e9 des correctifs pour une vuln\u00e9rabilit\u00e9 de type limitation insuffisante d\u0027un chemin d\u0027acc\u00e8s \u00e0 un r\u00e9pertoire restreint, aussi appel\u00e9 *path traversal*, affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L\u0027\u00e9diteur indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53771 permet \u00e0 un attaquant de provoquer une usurpation d\u0027identit\u00e9 sur un r\u00e9seau.\n\n**[Mise \u00e0 jour du 22 juillet 2025]**\n\nMicrosoft a publi\u00e9 les mises \u00e0 jour cumulatives (*Cumulative Update*, *CU*) de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016.\nL\u0027\u00e9diteur fournit \u00e9galement des marqueurs de compromission \u00e0 rechercher [3].\n\n**[Publication initiale]**\n\nLe 19 juillet 2025, Microsoft a publi\u00e9 des correctifs pour une vuln\u00e9rabilit\u00e9 de type jour-z\u00e9ro affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L\u0027\u00e9diteur indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 permet \u00e0 un attaquant de provoquer une d\u00e9s\u00e9rialisation de donn\u00e9es non fiables entrainant une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 est activement exploit\u00e9e.\n\nPour limiter les attaques potentielles, l\u0027\u00e9diteur a fait des recommandations [1].\n\nLe CERT-FR recommande les actions suivantes :\n* si l\u0027instance SharePoint est dans une version disposant d\u0027un correctif pour cette vuln\u00e9rabilit\u00e9 :\n * appliquer les derni\u00e8res mises \u00e0 jour de s\u00e9curit\u00e9, y compris la mise \u00e0 jour de s\u00e9curit\u00e9 de juillet 2025 ;\n * effectuer une rotation des cl\u00e9s de machine ASP.NET du SharePoint Server [2];\n * red\u00e9marrer IIS sur tous les serveurs SharePoint.\n* si \u00e7a n\u0027est pas le cas, d\u00e9connecter ou filtrer les acc\u00e8s \u00e0 cette instance.\n\nL\u0027\u00e9diteur fournit des moyens de d\u00e9tection et de protection pour Microsoft Defender Antivirus [1].\n\n## Recherche de compromission\n\n**\u003cspan class=\"important-content\"\u003e[Mise \u00e0 jour du 23 juillet 2025]\u003c/span\u003e**\n\nD\u00e8s que le correctif est appliqu\u00e9 ou l\u2019instance SharePoint isol\u00e9e :\n* effectuer une recherche de compromission ;\n* rechercher dans les journaux r\u00e9seau IIS SharePoint en privil\u00e9giant la p\u00e9riode allant du 7 juillet 2025 jusqu\u0027\u00e0 la date d\u0027application des correctifs de s\u00e9curit\u00e9.\n\nLes caract\u00e9ristiques des requ\u00eates HTTP sont d\u00e9crites ci-dessous:\n\n\u003ctable class=\"specificStd\"\u003e\n \u003cthead\u003e\n \u003ctr\u003e\n \u003cth class=\"specificTitle\"\u003eCaract\u00e9ristiques HTTP\u003c/th\u003e\n \u003cth class=\"specificTitle\"\u003eValeur(s) \u00e0 rechercher\u003c/th\u003e\n \u003c/tr\u003e\n \u003c/thead\u003e\n \u003ctbody\u003e\u003ctr\u003e\n \u003ctd class=\"specificStd\"\u003eM\u00e9thode HTTP\u003c/td\u003e\n \u003ctd class=\"specificStd\"\u003ePOST\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd class=\"specificStd\"\u003eURL\u003c/td\u003e\n \u003ctd class=\"specificStd\"\u003e/_layouts/15/ToolPane.aspx?DisplayMode=Edit\u0026a=/ToolPane.aspx\u003cbr\u003e /_layouts/16/ToolPane.aspx?DisplayMode=Edit\u0026a=/ToolPane.aspx\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd class=\"specificStd\"\u003eReferer\u003c/td\u003e\n \u003ctd class=\"specificStd\"\u003e/_layouts/SignOut.aspx \u003cbr\u003e https://\u003ccode\u003e\u0026lt;cible\u0026gt;\u003c/code\u003e/_layouts/SignOut.aspx \u003cbr\u003e http://\u003ccode\u003e\u0026lt;cible\u0026gt;\u003c/code\u003e/_layouts/SignOut.aspx\u003c/td\u003e\n \u003c/tr\u003e\n \u003c/tbody\u003e\n\u003c/table\u003e\n\u003cbr\u003e\n\u003ccode\u003e\u0026lt;cible\u0026gt;\u003c/code\u003e \u00e9tant le nom de domaine de votre SharePoint.\n\u003cbr\u003e\u003cbr\u003e\n\nSi des journaux syst\u00e8me sont disponibles, rechercher des processus inhabituels g\u00e9n\u00e9r\u00e9s par le processus IIS \u003ccode\u003ew3wp.exe\u003c/code\u003e tels que \u003ccode\u003epowershell.exe\u003c/code\u003e ou \u003ccode\u003ecmd.exe\u003c/code\u003e. \n\nEn cas de compromission, signaler l\u2019\u00e9v\u00e9nement aupr\u00e8s du CERT-FR en mettant en copie vos \u00e9ventuels CSIRTs m\u00e9tier et consulter les fiches r\u00e9flexes de compromission syst\u00e8me [4][5].\n\nLe CERT-FR recommande de d\u00e9terminer si l\u2019instance SharePoint n\u2019h\u00e9berge pas des secrets d\u2019administration du syst\u00e8me d\u0027information.",
"title": "[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans Microsoft SharePoint",
"vendor_advisories": [
{
"published_at": "2025-07-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"published_at": "2025-07-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
}
]
}
CERTFR-2025-ALE-010
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 23 juillet 2025]
Le 20 juillet 2025, Microsoft a publié des correctifs pour une vulnérabilité de type limitation insuffisante d'un chemin d'accès à un répertoire restreint, aussi appelé path traversal, affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L'éditeur indique que la vulnérabilité CVE-2025-53771 permet à un attaquant de provoquer une usurpation d'identité sur un réseau.
[Mise à jour du 22 juillet 2025]
Microsoft a publié les mises à jour cumulatives (Cumulative Update, CU) de sécurité pour SharePoint Enterprise Server 2016. L'éditeur fournit également des marqueurs de compromission à rechercher [3].
[Publication initiale]
Le 19 juillet 2025, Microsoft a publié des correctifs pour une vulnérabilité de type jour-zéro affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L'éditeur indique que la vulnérabilité CVE-2025-53770 permet à un attaquant de provoquer une désérialisation de données non fiables entrainant une exécution de code arbitraire à distance.
Microsoft indique que la vulnérabilité CVE-2025-53770 est activement exploitée.
Pour limiter les attaques potentielles, l'éditeur a fait des recommandations [1].
Le CERT-FR recommande les actions suivantes : * si l'instance SharePoint est dans une version disposant d'un correctif pour cette vulnérabilité : * appliquer les dernières mises à jour de sécurité, y compris la mise à jour de sécurité de juillet 2025 ; * effectuer une rotation des clés de machine ASP.NET du SharePoint Server [2]; * redémarrer IIS sur tous les serveurs SharePoint. * si ça n'est pas le cas, déconnecter ou filtrer les accès à cette instance.
L'éditeur fournit des moyens de détection et de protection pour Microsoft Defender Antivirus [1].
Recherche de compromission
[Mise à jour du 23 juillet 2025]
Dès que le correctif est appliqué ou l’instance SharePoint isolée : * effectuer une recherche de compromission ; * rechercher dans les journaux réseau IIS SharePoint en privilégiant la période allant du 7 juillet 2025 jusqu'à la date d'application des correctifs de sécurité.
Les caractéristiques des requêtes HTTP sont décrites ci-dessous:
| Caractéristiques HTTP | Valeur(s) à rechercher |
|---|---|
| Méthode HTTP | POST |
| URL | /_layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx /_layouts/16/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx |
| Referer | /_layouts/SignOut.aspx https:// <cible>/_layouts/SignOut.aspx http:// <cible>/_layouts/SignOut.aspx |
<cible> étant le nom de domaine de votre SharePoint.
Si des journaux système sont disponibles, rechercher des processus inhabituels générés par le processus IIS w3wp.exe tels que powershell.exe ou cmd.exe.
En cas de compromission, signaler l’événement auprès du CERT-FR en mettant en copie vos éventuels CSIRTs métier et consulter les fiches réflexes de compromission système [4][5].
Le CERT-FR recommande de déterminer si l’instance SharePoint n’héberge pas des secrets d’administration du système d'information.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
[Mise à jour du 23 juillet 2025]
L'éditeur annonce que SharePoint Enterprise Server 2010 et SharePoint Enterprise Server 2013 ne recevront pas de correctifs de sécurité. Le CERT-FR recommande aux utilisateurs de migrer vers un produit disposant de mises à jours.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | SharePoint Enterprise Server 2016 | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5513.1001 | ||
| Microsoft | SharePoint Server 2019 | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20037 | ||
| Microsoft | SharePoint Server Subscription Edition | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20508 | ||
| Microsoft | SharePoint Enterprise Server 2013 | Microsoft SharePoint Enterprise Server 2013 toutes versions | ||
| Microsoft | SharePoint Enterprise Server 2010 | Microsoft SharePoint Enterprise Server 2010 toutes versions |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5513.1001",
"product": {
"name": "SharePoint Enterprise Server 2016",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20037",
"product": {
"name": "SharePoint Server 2019",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20508",
"product": {
"name": "SharePoint Server Subscription Edition",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2013 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2013",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2010 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2010",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "**\u003cspan class=\"important-content\"\u003e[Mise \u00e0 jour du 23 juillet 2025]\u003c/span\u003e**\n\nL\u0027\u00e9diteur annonce que SharePoint Enterprise Server 2010 et SharePoint Enterprise Server 2013 ne recevront pas de correctifs de s\u00e9curit\u00e9. Le CERT-FR recommande aux utilisateurs de migrer vers un produit disposant de mises \u00e0 jours.",
"closed_at": "2025-08-26",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53770"
},
{
"name": "CVE-2025-53771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53771"
}
],
"links": [
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Enterprise Server 2016 (KB5002760)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108288"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Server 2019 Core (KB5002754)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108286"
},
{
"title": "[1] Conseils aux clients pour la vuln\u00e9rabilit\u00e9 SharePoint CVE-2025-53770",
"url": "https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/"
},
{
"title": "Description de la mise \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 : 8 juillet 2025 (KB5002744)",
"url": "https://support.microsoft.com/fr-fr/topic/description-of-the-security-update-for-sharepoint-enterprise-server-2016-july-8-2025-kb5002744-9196e240-c76d-4bb0-b16c-6f7d6645a1f0"
},
{
"title": "[5] Compromission syst\u00e8me - Endiguement",
"url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2024-RFX-006/"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Enterprise Server 2016 Language Pack (KB5002759)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108289"
},
{
"title": "Description de la mise \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Server 2019 : 8 juillet 2025 (KB5002741)",
"url": "https://support.microsoft.com/fr-fr/topic/description-of-the-security-update-for-sharepoint-server-2019-july-8-2025-kb5002741-d860f51b-fcdf-41e4-89de-9ce487c06548"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 pour Microsoft SharePoint Server Subscription Edition (KB5002768)",
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108285"
},
{
"title": "Avis CERT-FR CERTFR-2025-AVI-0611 du 21 juillet 2025",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0611/"
},
{
"title": "[4] Compromission syst\u00e8me - Qualification",
"url": "https://www.cert.ssi.gouv.fr/fiche/CERTFR-2024-RFX-005/"
},
{
"title": "[2] Am\u00e9lioration de la s\u00e9curit\u00e9 de l\u0027\u00e9tat de ASP.NET et de la gestion des cl\u00e9s",
"url": "https://learn.microsoft.com/en-us/sharepoint/security-for-sharepoint-server/improved-asp-net-view-state-security-key-management"
},
{
"title": "[3] Pr\u00e9vention de l\u0027exploitation active des vuln\u00e9rabilit\u00e9s de SharePoint",
"url": "https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/"
}
],
"reference": "CERTFR-2025-ALE-010",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-21T00:00:00.000000"
},
{
"description": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 et marqueurs de compromission disponibles. ",
"revision_date": "2025-07-22T00:00:00.000000"
},
{
"description": "Ajout de la r\u00e9f\u00e9rence CVE CVE-2025-53771, informations sur les produits obsol\u00e8tes et recherche de compromission",
"revision_date": "2025-07-23T00:00:00.000000"
},
{
"description": " Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2025-08-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "**\u003cspan class=\"important-content\"\u003e[Mise \u00e0 jour du 23 juillet 2025]\u003c/span\u003e**\n\nLe 20 juillet 2025, Microsoft a publi\u00e9 des correctifs pour une vuln\u00e9rabilit\u00e9 de type limitation insuffisante d\u0027un chemin d\u0027acc\u00e8s \u00e0 un r\u00e9pertoire restreint, aussi appel\u00e9 *path traversal*, affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L\u0027\u00e9diteur indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53771 permet \u00e0 un attaquant de provoquer une usurpation d\u0027identit\u00e9 sur un r\u00e9seau.\n\n**[Mise \u00e0 jour du 22 juillet 2025]**\n\nMicrosoft a publi\u00e9 les mises \u00e0 jour cumulatives (*Cumulative Update*, *CU*) de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016.\nL\u0027\u00e9diteur fournit \u00e9galement des marqueurs de compromission \u00e0 rechercher [3].\n\n**[Publication initiale]**\n\nLe 19 juillet 2025, Microsoft a publi\u00e9 des correctifs pour une vuln\u00e9rabilit\u00e9 de type jour-z\u00e9ro affectant SharePoint Enterprise Server 2016, SharePoint Server 2019 et SharePoint Server Subscription Edition. L\u0027\u00e9diteur indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 permet \u00e0 un attaquant de provoquer une d\u00e9s\u00e9rialisation de donn\u00e9es non fiables entrainant une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 est activement exploit\u00e9e.\n\nPour limiter les attaques potentielles, l\u0027\u00e9diteur a fait des recommandations [1].\n\nLe CERT-FR recommande les actions suivantes :\n* si l\u0027instance SharePoint est dans une version disposant d\u0027un correctif pour cette vuln\u00e9rabilit\u00e9 :\n * appliquer les derni\u00e8res mises \u00e0 jour de s\u00e9curit\u00e9, y compris la mise \u00e0 jour de s\u00e9curit\u00e9 de juillet 2025 ;\n * effectuer une rotation des cl\u00e9s de machine ASP.NET du SharePoint Server [2];\n * red\u00e9marrer IIS sur tous les serveurs SharePoint.\n* si \u00e7a n\u0027est pas le cas, d\u00e9connecter ou filtrer les acc\u00e8s \u00e0 cette instance.\n\nL\u0027\u00e9diteur fournit des moyens de d\u00e9tection et de protection pour Microsoft Defender Antivirus [1].\n\n## Recherche de compromission\n\n**\u003cspan class=\"important-content\"\u003e[Mise \u00e0 jour du 23 juillet 2025]\u003c/span\u003e**\n\nD\u00e8s que le correctif est appliqu\u00e9 ou l\u2019instance SharePoint isol\u00e9e :\n* effectuer une recherche de compromission ;\n* rechercher dans les journaux r\u00e9seau IIS SharePoint en privil\u00e9giant la p\u00e9riode allant du 7 juillet 2025 jusqu\u0027\u00e0 la date d\u0027application des correctifs de s\u00e9curit\u00e9.\n\nLes caract\u00e9ristiques des requ\u00eates HTTP sont d\u00e9crites ci-dessous:\n\n\u003ctable class=\"specificStd\"\u003e\n \u003cthead\u003e\n \u003ctr\u003e\n \u003cth class=\"specificTitle\"\u003eCaract\u00e9ristiques HTTP\u003c/th\u003e\n \u003cth class=\"specificTitle\"\u003eValeur(s) \u00e0 rechercher\u003c/th\u003e\n \u003c/tr\u003e\n \u003c/thead\u003e\n \u003ctbody\u003e\u003ctr\u003e\n \u003ctd class=\"specificStd\"\u003eM\u00e9thode HTTP\u003c/td\u003e\n \u003ctd class=\"specificStd\"\u003ePOST\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd class=\"specificStd\"\u003eURL\u003c/td\u003e\n \u003ctd class=\"specificStd\"\u003e/_layouts/15/ToolPane.aspx?DisplayMode=Edit\u0026a=/ToolPane.aspx\u003cbr\u003e /_layouts/16/ToolPane.aspx?DisplayMode=Edit\u0026a=/ToolPane.aspx\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd class=\"specificStd\"\u003eReferer\u003c/td\u003e\n \u003ctd class=\"specificStd\"\u003e/_layouts/SignOut.aspx \u003cbr\u003e https://\u003ccode\u003e\u0026lt;cible\u0026gt;\u003c/code\u003e/_layouts/SignOut.aspx \u003cbr\u003e http://\u003ccode\u003e\u0026lt;cible\u0026gt;\u003c/code\u003e/_layouts/SignOut.aspx\u003c/td\u003e\n \u003c/tr\u003e\n \u003c/tbody\u003e\n\u003c/table\u003e\n\u003cbr\u003e\n\u003ccode\u003e\u0026lt;cible\u0026gt;\u003c/code\u003e \u00e9tant le nom de domaine de votre SharePoint.\n\u003cbr\u003e\u003cbr\u003e\n\nSi des journaux syst\u00e8me sont disponibles, rechercher des processus inhabituels g\u00e9n\u00e9r\u00e9s par le processus IIS \u003ccode\u003ew3wp.exe\u003c/code\u003e tels que \u003ccode\u003epowershell.exe\u003c/code\u003e ou \u003ccode\u003ecmd.exe\u003c/code\u003e. \n\nEn cas de compromission, signaler l\u2019\u00e9v\u00e9nement aupr\u00e8s du CERT-FR en mettant en copie vos \u00e9ventuels CSIRTs m\u00e9tier et consulter les fiches r\u00e9flexes de compromission syst\u00e8me [4][5].\n\nLe CERT-FR recommande de d\u00e9terminer si l\u2019instance SharePoint n\u2019h\u00e9berge pas des secrets d\u2019administration du syst\u00e8me d\u0027information.",
"title": "[M\u00e0J] Multiples vuln\u00e9rabilit\u00e9s dans Microsoft SharePoint",
"vendor_advisories": [
{
"published_at": "2025-07-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"published_at": "2025-07-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
}
]
}
CERTFR-2025-AVI-0611
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.
Microsoft indique que la vulnérabilité CVE-2025-53770 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | SharePoint Enterprise Server 2016 | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5513.1001 | ||
| Microsoft | SharePoint Server 2019 | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20037 | ||
| Microsoft | SharePoint Server Subscription Edition | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20508 | ||
| Microsoft | SharePoint Enterprise Server 2013 | Microsoft SharePoint Enterprise Server 2013 toutes versions | ||
| Microsoft | N/A | Microsoft Purview | ||
| Microsoft | SharePoint Enterprise Server 2010 | Microsoft SharePoint Enterprise Server 2010 toutes versions |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5513.1001",
"product": {
"name": "SharePoint Enterprise Server 2016",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20037",
"product": {
"name": "SharePoint Server 2019",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20508",
"product": {
"name": "SharePoint Server Subscription Edition",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2013 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2013",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Purview",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2010 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2010",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53762"
},
{
"name": "CVE-2025-53770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53770"
},
{
"name": "CVE-2025-53771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53771"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0611",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-21T00:00:00.000000"
},
{
"description": " Mises \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 disponibles.",
"revision_date": "2025-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-07-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"published_at": "2025-07-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53762",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762"
}
]
}
CERTFR-2025-AVI-0611
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.
Microsoft indique que la vulnérabilité CVE-2025-53770 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | SharePoint Enterprise Server 2016 | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5513.1001 | ||
| Microsoft | SharePoint Server 2019 | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20037 | ||
| Microsoft | SharePoint Server Subscription Edition | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20508 | ||
| Microsoft | SharePoint Enterprise Server 2013 | Microsoft SharePoint Enterprise Server 2013 toutes versions | ||
| Microsoft | N/A | Microsoft Purview | ||
| Microsoft | SharePoint Enterprise Server 2010 | Microsoft SharePoint Enterprise Server 2010 toutes versions |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5513.1001",
"product": {
"name": "SharePoint Enterprise Server 2016",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20037",
"product": {
"name": "SharePoint Server 2019",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20508",
"product": {
"name": "SharePoint Server Subscription Edition",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2013 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2013",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Purview",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2010 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2010",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53762"
},
{
"name": "CVE-2025-53770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53770"
},
{
"name": "CVE-2025-53771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53771"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0611",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-21T00:00:00.000000"
},
{
"description": " Mises \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 disponibles.",
"revision_date": "2025-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-07-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"published_at": "2025-07-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53762",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762"
}
]
}
CVE-2025-53771
Vulnerability from fstec - Published: 20.07.2025{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:P/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Microsoft SharePoint Enterprise Server 2016), - (Microsoft SharePoint Server 2019), - (Microsoft SharePoint Server Subscription Edition)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "20.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "22.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "22.07.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-08787",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53771",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2019, Microsoft SharePoint Server Subscription Edition",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c Microsoft SharePoint Server \u0438 SharePoint Enterprise Server, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433-\u0430\u0442\u0430\u043a\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (\u00ab\u041e\u0431\u0445\u043e\u0434 \u043f\u0443\u0442\u0438\u00bb) (CWE-22), \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-707)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c Microsoft SharePoint Server \u0438 SharePoint Enterprise Server \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433-\u0430\u0442\u0430\u043a\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-22, CWE-707",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
MSRC_CVE-2025-53771
Vulnerability from csaf_microsoft - Published: 2025-07-08 07:00 - Updated: 2025-07-31 07:00Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Anonymous"
]
},
{
"names": [
"Anonymous"
]
},
{
"names": [
"Viettel Cyber Security with Trend Zero Day Initiative\n "
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53771 Microsoft SharePoint Server Spoofing Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"category": "self",
"summary": "CVE-2025-53771 Microsoft SharePoint Server Spoofing Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53771.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Microsoft SharePoint Server Spoofing Vulnerability",
"tracking": {
"current_release_date": "2025-07-31T07:00:00.000Z",
"generator": {
"date": "2025-08-23T00:39:18.798Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53771",
"initial_release_date": "2025-07-08T07:00:00.000Z",
"revision_history": [
{
"date": "2025-07-20T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-07-20T07:00:00.000Z",
"legacy_version": "2",
"number": "2",
"summary": "The security update is available for Microsoft SharePoint Server 2019. Microsoft strongly encourages customers running this version of SharePoint to install this update as soon as possible."
},
{
"date": "2025-07-21T07:00:00.000Z",
"legacy_version": "3",
"number": "3",
"summary": "The security update is available for Microsoft SharePoint Server Subscription Edition. Microsoft strongly encourages customers running this version of SharePoint to install this update as soon as possible."
},
{
"date": "2025-07-21T07:00:00.000Z",
"legacy_version": "3.1",
"number": "4",
"summary": "Added an FAQ and updated the CVSS score. This is an informational change only."
},
{
"date": "2025-07-21T07:00:00.000Z",
"legacy_version": "3.2",
"number": "5",
"summary": "Added an acknowledgement. This is an informational change only."
},
{
"date": "2025-07-22T07:00:00.000Z",
"legacy_version": "3.3",
"number": "6",
"summary": "Updated one or more CVSS scores for the affected products. This is an informational change only."
},
{
"date": "2025-07-22T07:00:00.000Z",
"legacy_version": "3.4",
"number": "7",
"summary": "Updated CWE value. This is an informational change only."
},
{
"date": "2025-07-24T07:00:00.000Z",
"legacy_version": "3.4",
"number": "8",
"summary": "Corrected the Download and Article links in the Security Updates table. This is an informational change only."
},
{
"date": "2025-07-31T07:00:00.000Z",
"legacy_version": "3.5",
"number": "9",
"summary": "Updated the executive summary with current information. This is an informational change only."
},
{
"date": "2025-07-31T07:00:00.000Z",
"legacy_version": "3.6",
"number": "10",
"summary": "Added an FAQ to explain that the security update KB for SharePoint Server 2016 applies to both Microsoft SharePoint Server 2016 and Microsoft SharePoint Enterprise Server 2016. This is an informational change only."
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.5513.1001",
"product": {
"name": "Microsoft SharePoint Enterprise Server 2016 \u003c16.0.5513.1001",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "16.0.5513.1001",
"product": {
"name": "Microsoft SharePoint Enterprise Server 2016 16.0.5513.1001",
"product_id": "10950"
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Enterprise Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.10417.20037",
"product": {
"name": "Microsoft SharePoint Server 2019 \u003c16.0.10417.20037",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "16.0.10417.20037",
"product": {
"name": "Microsoft SharePoint Server 2019 16.0.10417.20037",
"product_id": "11585"
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Server 2019"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.18526.20508",
"product": {
"name": "Microsoft SharePoint Server Subscription Edition \u003c16.0.18526.20508",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "16.0.18526.20508",
"product": {
"name": "Microsoft SharePoint Server Subscription Edition 16.0.18526.20508",
"product_id": "11961"
}
}
],
"category": "product_name",
"name": "Microsoft SharePoint Server Subscription Edition"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53771",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "Yes, the update for CVE-2025-53770 includes more robust protections than the update for CVE-2025-49704. The update for CVE-2025-53771 includes more robust protections than the update for CVE-2025-49706.",
"title": "Are the two new CVEs that were released related to the two SharePoint vulnerabilities that were documented by CVE-2025-49704 and CVE-2025-49706?"
},
{
"category": "faq",
"text": "Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.",
"title": "There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?"
},
{
"category": "faq",
"text": "Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.",
"title": "I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running?"
}
],
"product_status": {
"fixed": [
"10950",
"11585",
"11961"
],
"known_affected": [
"1",
"2",
"3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53771 Microsoft SharePoint Server Spoofing Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"category": "self",
"summary": "CVE-2025-53771 Microsoft SharePoint Server Spoofing Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53771.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-20T07:00:00.000Z",
"details": "16.0.5513.1001:Security Update:https://support.microsoft.com/help/5002760",
"product_ids": [
"3"
],
"url": "https://support.microsoft.com/help/5002760"
},
{
"category": "vendor_fix",
"date": "2025-07-20T07:00:00.000Z",
"details": "16.0.5513.1001:Security Update:https://support.microsoft.com/help/5002759",
"product_ids": [
"3"
],
"url": "https://support.microsoft.com/help/5002759"
},
{
"category": "vendor_fix",
"date": "2025-07-20T07:00:00.000Z",
"details": "16.0.10417.20037:Security Update:https://www.microsoft.com/en-us/download/details.aspx?id=108286",
"product_ids": [
"2"
],
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108286"
},
{
"category": "vendor_fix",
"date": "2025-07-20T07:00:00.000Z",
"details": "16.0.10417.20037:Security Update:https://support.microsoft.com/help/5002753",
"product_ids": [
"2"
],
"url": "https://support.microsoft.com/help/5002753"
},
{
"category": "vendor_fix",
"date": "2025-07-20T07:00:00.000Z",
"details": "16.0.18526.20508:Security Update:https://www.microsoft.com/en-us/download/details.aspx?id=108285",
"product_ids": [
"1"
],
"url": "https://www.microsoft.com/en-us/download/details.aspx?id=108285"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Spoofing"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Microsoft SharePoint Server Spoofing Vulnerability"
}
]
}
CNVD-2025-16683
Vulnerability from cnvd - Published: 2025-07-23目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771
| Name | ['Microsoft SharePoint Enterprise Server 2016', 'Microsoft SharePoint Server 2019', 'Microsoft SharePoint Server Subscription Edition'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-53771"
}
},
"description": "SharePoint Server\u662f\u5fae\u8f6f\u63d0\u4f9b\u7684\u672c\u5730\u90e8\u7f72\u7684\u4f01\u4e1a\u534f\u4f5c\u5e73\u53f0\uff0c\u652f\u6301\u5185\u5bb9\u5171\u4eab\u3001\u77e5\u8bc6\u7ba1\u7406\u548c\u5e94\u7528\u6574\u5408\uff0c\u53ef\u4e0e Microsoft 365\u8ba2\u9605\u65e0\u7f1d\u5bf9\u63a5\u4ee5\u83b7\u53d6\u6700\u65b0\u529f\u80fd\u3002\n\nMicrosoft SharePoint Server\u5b58\u5728\u6b3a\u9a97\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u53d7\u9650\u76ee\u5f55\u7684\u8def\u5f84\u540d\u9650\u5236\u4e0d\u5f53\uff0c\u672a\u7ecf\u6388\u6743\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u7f51\u7edc\u53d1\u8d77\u6b3a\u9a97\u653b\u51fb\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a \r\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-16683",
"openTime": "2025-07-23",
"patchDescription": "SharePoint Server\u662f\u5fae\u8f6f\u63d0\u4f9b\u7684\u672c\u5730\u90e8\u7f72\u7684\u4f01\u4e1a\u534f\u4f5c\u5e73\u53f0\uff0c\u652f\u6301\u5185\u5bb9\u5171\u4eab\u3001\u77e5\u8bc6\u7ba1\u7406\u548c\u5e94\u7528\u6574\u5408\uff0c\u53ef\u4e0e Microsoft 365\u8ba2\u9605\u65e0\u7f1d\u5bf9\u63a5\u4ee5\u83b7\u53d6\u6700\u65b0\u529f\u80fd\u3002\r\n\r\nMicrosoft SharePoint Server\u5b58\u5728\u6b3a\u9a97\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u53d7\u9650\u76ee\u5f55\u7684\u8def\u5f84\u540d\u9650\u5236\u4e0d\u5f53\uff0c\u672a\u7ecf\u6388\u6743\u7684\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u7f51\u7edc\u53d1\u8d77\u6b3a\u9a97\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft SharePoint Server\u6b3a\u9a97\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft SharePoint Enterprise Server 2016",
"Microsoft SharePoint Server 2019",
"Microsoft SharePoint Server Subscription Edition"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2025-53771",
"serverity": "\u4e2d",
"submitTime": "2025-07-23",
"title": "Microsoft SharePoint Server\u6b3a\u9a97\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.