Connect with us

Hi, what are you looking for?

HEADLINES

Microsoft SharePoint breach linked to vulnerabilities discovered by Viettel Cyber Security

This vulnerability chain enables threat actors to bypass authentication mechanisms, upload webshells, and remotely execute malicious code without prior access. Critically, if attackers succeed in extracting the ValidationKey and DecryptionKey, they may be able to retain persistent control over the system — even after security patches have been applied.

Critical Microsoft SharePoint Zero-Day vulnerabilities — now confirmed to be exploited in real-world attacks — was originally discovered and responsibly disclosed by Viettel Cyber Security (VCS).

SharePoint software is commonly used by global businesses and organizations to store and collaborate on documents.These vulnerabilities affect on-premises SharePoint servers only and do not affect SharePoint Online in Microsoft 365. This vulnerability chain enables threat actors to bypass authentication mechanisms, upload webshells, and remotely execute malicious code without prior access. Critically, if attackers succeed in extracting the ValidationKey and DecryptionKey, they may be able to retain persistent control over the system — even after security patches have been applied

The timeline

On May 16, 2025, at Pwn2Own Berlin 2025, our researcher Dinh Ho Anh Khoa – a member of VCS’s elite research team – successfully chained an authentication bypass with an insecure deserialization bug to gain unauthorized access in SharePoint. The exploit then earned him $100,000 from the Pwn2Own organizer and later became CVE-2025-49704 and CVE-2025-49706.

These findings were uncovered by VCS’s elite research team as part of an ongoing effort to proactively identify high-risk flaws before threat actors can weaponize them. The vulnerabilities were immediately reported to Microsoft and Trend Micro’s Zero Day Initiative (ZDI) – the Pwn2Own organizer – through responsible disclosure programs, in full alignment with global standards.

Advertisement. Scroll to continue reading.

1,5 months later on July 8, 2025, Microsoft released patches for CVE-2025-49704 and CVE-2025-49706 as part of the July 2025 Patch Tuesday security update.Shortly after that, Viettel Cyber Security Threat Intelligence had issued an early warning regarding critical vulnerabilities addressed and guidance to help reduce exposure and strengthen defenses for our customers.

On July 19, 2025, according to Microsoft, there are active attacks targeting on-premises SharePoint Server customers by exploiting vulnerabilities partially addressed by the July Security Update. These exploit was later named CVE-2025-53770 and CVE-2025-53771. Microsoft also released an security updates that “ that fully protect customers using all supported versions of SharePoint affected by CVE-2025-53770 and CVE-2025-53771”

Following Microsoft’s official disclosure, it has been confirmed that these vulnerabilities are now being actively exploited at scale. The exploitation has been observed on servers that have not yet applied Microsoft’s Patch Tuesday update. Immediate action is strongly recommended to prevent potential compromise and protect critical infrastructure.

Viettel Cyber Security recommends actions and detailed technical analysis of vulnerabilities

This is not the first time VCS has reported critical vulnerabilities to major global technology companies through ZDI. Over the years, VCS has responsibly disclosed multiple high-impact security flaws in products from Microsoft, Oracle, HP, Canon, Synology, QNAP Systems, Nvidia, etc, — helping them patch issues before they could be weaponized.

Advertisement. Scroll to continue reading.

At Viettel Cyber Security, our top priority is clear: to defend the ecosystem and against real-world threats. By sharing what we know, we aim to strengthen the entire security community, help organizations understand the vulnerability and take action to stop attackers.

Viettel Cyber Security has released the guideline to protect against CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771, including prevention strategies, detection patterns and threat hunting techniques here

We recommend that organizations immediately take the following actions to prevent risks from the vulnerability chain:

  • For supported versions (SharePoint Server 2016, 2019, and Subscription Edition), organizations should:
  • Immediately apply the July 2025 Security Update from Microsoft, which patches CVE-2025-49704, CVE-2025-49706, CVE-2025-53770 and CVE-2025-53771.
  • Rotate machine keys, then restart IIS.
  • Enable Antimalware Scan Interface (AMSI) on all SharePoint servers.
  • Restrict direct internet access from SharePoint servers to limit data exfiltration or malware downloads.
  • Use WAF or reverse proxy to proactively filter out malicious requests.
  • For End-of-Life SharePoint Versions (No Security Patches Available – SharePoint 2010, 2013):

  • Plan to upgrade to supported versions to receive security updates.
  • Temporarily implement compensating technical controls via configuring firewall, WAF, or reverse proxy rules to block all requests to /ToolPane.aspx, including requests with appended pathInfo; inspecting and block suspicious POST requests.
  • Monitor logs and file changes in /LAYOUTS/ directory.
  • Isolate legacy SharePoint servers from the internet if they are used solely for internal operations
  • Strengthen detection using EDR or antivirus.
  • To help organizations detect ToolShell-related attacks early, Viettel Cyber Security recommends organizations should implement multi-layered monitoring, including IDS/IPS, WAF, EDR, and system log analysis. Security teams should also check for signs of compromise to assess whether a SharePoint environment has been breached. Full detection and threat hunting guidelines are provided in our technical report.

    The researcher, Dinh Ho Anh Khoa, also published a detailed technical blog regarding the vulnerabilities CVE-2025-49706 & CVE-2025-49704 for informational purposes. Please check his findings here.

    Advertisement. Scroll to continue reading.
    Advertisement
    Advertisement
    Advertisement

    Like Us On Facebook

    You May Also Like

    HEADLINES

    These new capabilities help retailers move faster, serve shoppers with greater relevance, and operate with resilience and efficiency, delivering a modern foundation for growth...

    HEADLINES

    The announcements are aligned with Microsoft’s mission to support education in the AI era.

    HEADLINES

    This commitment of support aligns with Maya’s broader approach to cybersecurity, treating protection as a core priority across both platform safeguards and consumer education.

    HEADLINES

    As cloud infrastructure grows to host the influx of AI workloads, it has become a critical target, with 99% of respondents reporting at least...

    HEADLINES

    Mass layoffs, hiring freezes, market uncertainty, and rushed AI integration crack businesses wide open to cyberattacks. Visionary leaders, however, can see the current situation...

    HEADLINES

    These campaigns mix convincing visuals, well known hosting platforms like Discord, and regularly updated malware kits to evade detection by users and detection tools.

    HEADLINES

    Sophos XDR detected 100% of adversary behaviors (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated...

    HEADLINES

    As AI adoption accelerates across Philippine sectors such as finance, telecom, and retail, the report’s findings are especially relevant for local business leaders and...

    Advertisement