A zero-day vulnerability (CVE‑2025‑53770) in Microsoft’s on-premises SharePoint server software has been actively exploited in a global cyberattack, affecting approximately 75 servers across U.S. federal and state agencies, universities, energy companies, European governments, an Asian telecom firm, and more
💥 Scope & Severity
- Exploited by unknown attackers in a spoofing-style zero-day attack, enabling unauthorized access and code execution
- Some victims suffered stolen cryptographic keys, allowing persistent re-entry even after patching
- Incident marks one of the most significant breaches since the 2021 Exchange hacks
🔧 Response & Mitigation Efforts
- Microsoft has released a patch for one SharePoint version; two others remain vulnerable while fixes are being developed
- CISA and FBI are coordinating with Microsoft and international agencies to investigate and contain the attack
- In the interim, organizations are advised to disconnect servers, apply mitigation steps, and cloak against exploitable entry points
🌍 Global Impact & Affected Organizations
- The breach spans multiple sectors—government, education, energy, telecommunications, and more
- Victimized entities include at least two unidentified U.S. federal agencies, a state legislature, a Spanish government body, and a Brazilian university
- Security advisories emphasize tens of thousands of SharePoint servers remain at risk globally
🔐 Why It Matters
- National security risk: Government intrusion has stolen public documents and wiped repositories meant for citizen access
- Microsoft under scrutiny: The firm has faced criticism for narrowly scoped patches and delayed incident response, most recently over Chinese espionage breaches The Washington Post.
- Parallel to 2021 Exchange incident: This breach revives fears of large-scale system vulnerabilities in widely deployed on-premises Microsoft software
🔮 What Comes Next
- Microsoft is rolling out patches for remaining versions and urges all users to immediately upgrade
- Agencies must audit for unauthorized access, conduct forensic reviews, and reinstall compromised servers if keys were stolen
- Strengthening future resilience: Agencies will review network exposure, tighten cyber defenses, and bolster incident-response capabilities.