The user's query accurately captures an escalating threat landscape involving two critical vulnerabilities in on-premises Microsoft SharePoint Server: CVE-2025-53770 (deserialization of untrusted data leading to remote code execution, CVSS 9.8) and CVE-2025-53771 (path traversal spoofing, CVSS 6.5). Initially exploited for espionage and backdoor deployment (e.g., ToolShell webshell), attacks have escalated to ransomware deployment as of July 18, 2025, primarily by the China-based threat actor Storm-2603 using Warlock ransomware. Microsoft confirmed active exploitation starting as early as July 7, 2025, affecting global organizations, including government and critical infrastructure. While SharePoint Online (Microsoft 365) is unaffected, on-premises instances remain at high risk if unpatched. A detailed remediation guide was released by Microsoft and echoed by agencies like CISA and Singapore's CSA, emphasizing immediate patching, key rotation, and AMSI enablement. No widespread classified data loss reported, but disruptions and ransomware infections have impacted sectors like energy and finance.Key facts from reports:
Aspect | CVE-2025-53770 | CVE-2025-53771 | Recommendations |
---|---|---|---|
Type | Deserialization RCE (CVSS 9.8) | Path Traversal Spoofing (CVSS 6.5) | Apply OOB patches immediately; enable AMSI in Full Mode. |
Affected Versions | SharePoint Server 2016, 2019, Subscription Edition (on-premises only) | Same as left | Rotate MachineKeys post-patch; restart IIS on all servers. |
Exploitation | Unauth RCE for webshell deployment; chained for key theft | Patch bypass for spoofing/auth bypass | Deploy EDR like Defender for Endpoint; hunt with provided queries. |
Actors/Impact | Chinese APTs (espionage); Storm-2603 (ransomware) | Enables escalation to Warlock ransomware | If unpatched, disconnect from internet or use VPN/auth proxy. |
IOCs | Webshells (spinstall0.aspx, hash: 92bb4ddb...); suspicious .js/.dll files | GPO modifications for ransomware | Scan for IOCs using Sysmon/EDR; monitor for unusual IIS processes. |
This escalation from espionage to ransomware highlights evolving threats in legacy on-premises systems. For full remediation scripts or IOC lists, refer to Microsoft/CISA resources or provide more specifics!