Bivash Nayak
26 Jul
26Jul
Published July 26, 2025 by Cyber Dude Bivash

1. Microsoft SharePoint β€œToolShell” Zero‑Days Under Active Attack

  • CVE‑2025‑53770 & CVE‑2025‑53771 are critical zero‑day vulnerabilities in on‑premises SharePoint Server. They’re being actively exploited by Chinese-linked APTs Linen Typhoon, Violet Typhoon, and Storm‑2603. Rapid7+9Windows Central+9Cyware Labs+9
  • Attackers are deploying both Warlock and LockBit ransomware, stealing cryptographic keys, and establishing persistent access on compromised servers. The Times of India+2Tom's Hardware+2IT Pro+2
  • Microsoft issued out‑of‑band emergency patches, but initial fixes were bypassedβ€”prompting further updates and investigations into possible information leaks within their MAPP program. The Wall Street Journal+1Windows Central+1

βœ… Mitigation steps:

Install the latest patches for all affected SharePoint versions, rotate MachineKeys, enable AMSI/Defender, restart IIS, isolate affected hosts, review logs, and monitor for indicators of compromise.


2. CitrixBleedβ€―2 Critical Exploit (CVE‑2025‑5777)

βœ… Mitigation steps:

Immediately patch NetScaler devices, restrict public access, monitor traffic for suspicious scanning or requests, and enforce strict input validation.


3. Cisco ISE / ISE‑PIC Unauthenticated Root Code Execution (CVE‑2025‑20281β€―&β€―2025‑20282)

βœ… Mitigation steps:

Apply updates for ISE and ISE‑PIC (versions 3.3 and 3.4), segment network access, restrict administrative access by IP, and monitor NAC logs for anomalies.


πŸ“‹ Quick Summary Table

VulnerabilityKey RiskAttack StatusMitigation
SharePoint CVE‑53770/53771Ransomware deployment, key theftActively exploited by nation-state APTsPatch now, rotate keys, isolate hosts
CitrixBleedβ€―2 CVE‑5777Session token theft, data exposureActive scan & exploit in progressImmediate patch & restrict public exposure
Cisco ISE CVE‑2025‑20281/2Full root takeoverReal‑world exploitation confirmedPatch, segment access, monitor


Comments
* The email will not be published on the website.