Bivash Nayak
26 Jul
26Jul
Published July 26, 2025 by Cyber Dude Bivash

1. Microsoft SharePoint “ToolShell” Zero‑Days Under Active Attack

  • CVE‑2025‑53770 & CVE‑2025‑53771 are critical zero‑day vulnerabilities in on‑premises SharePoint Server. They’re being actively exploited by Chinese-linked APTs Linen Typhoon, Violet Typhoon, and Storm‑2603. Rapid7+9Windows Central+9Cyware Labs+9
  • Attackers are deploying both Warlock and LockBit ransomware, stealing cryptographic keys, and establishing persistent access on compromised servers. The Times of India+2Tom's Hardware+2IT Pro+2
  • Microsoft issued out‑of‑band emergency patches, but initial fixes were bypassed—prompting further updates and investigations into possible information leaks within their MAPP program. The Wall Street Journal+1Windows Central+1

✅ Mitigation steps:

Install the latest patches for all affected SharePoint versions, rotate MachineKeys, enable AMSI/Defender, restart IIS, isolate affected hosts, review logs, and monitor for indicators of compromise.


2. CitrixBleed 2 Critical Exploit (CVE‑2025‑5777)

✅ Mitigation steps:

Immediately patch NetScaler devices, restrict public access, monitor traffic for suspicious scanning or requests, and enforce strict input validation.


3. Cisco ISE / ISE‑PIC Unauthenticated Root Code Execution (CVE‑2025‑20281 & 2025‑20282)

✅ Mitigation steps:

Apply updates for ISE and ISE‑PIC (versions 3.3 and 3.4), segment network access, restrict administrative access by IP, and monitor NAC logs for anomalies.


📋 Quick Summary Table

VulnerabilityKey RiskAttack StatusMitigation
SharePoint CVE‑53770/53771Ransomware deployment, key theftActively exploited by nation-state APTsPatch now, rotate keys, isolate hosts
CitrixBleed 2 CVE‑5777Session token theft, data exposureActive scan & exploit in progressImmediate patch & restrict public exposure
Cisco ISE CVE‑2025‑20281/2Full root takeoverReal‑world exploitation confirmedPatch, segment access, monitor


Comments
* The email will not be published on the website.