Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
- Last update: 24/07/2025
- Affected software:
→ Microsoft SharePoint Server Subscription Edition
→ Microsoft SharePoint Server 2019
→ Microsoft SharePoint Server 2016- Type: Remote Code Execution, Path traversal
- CVE/CVSS
→ CVE-2025-53770: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
→ CVE-2025-53771: CVSS 6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N)
Microsoft - https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
Microsoft published an emergency security update for two vulnerabilities that are being actively exploited (CVE-2025-53770 and CVE-2025-53771). The vulnerabilities were first addressed in the July Patch Tuesday (as CVE-2025-49704 and CVE-2025-49706), but threat actors developed exploits that bypass this exploit chain, also known as ToolShell.
As a result, an unauthenticated threat actor can gain full access to SharePoint content, including file systems and internal configurations, and execute code remotely,and move laterally across the Windows domain, while bypassing identity protections such as MFA or SSO. Since SharePoint often connects to core services such as Outlook, Teams and OneDrive, a breach can quickly lead to data theft, password harvesting and lateral movement across the network.
Threat actors were observed dropping malicious ASPX payloads via PowerShell and stealing machine keys to maintain persistence. Therefore, patching must be followed by rotating the SharePoint Server ASP.NET machine keys to invalidate future IIS tokens created by malicious actors. Additionally, persistent backdoors were observed that can survive reboots and updates. If you see signs of compromise, do a thorough forensic investigation and if in doubt, consult expert incident response services.
The vulnerabilities affect on-premises SharePoint instances and emergency patches are available.
CVE-2025-53770 is a deserialization of untrusted data vulnerability in on-premises Microsoft SharePoint Server that allows an unauthorized attacker to execute code over the network.
CVE-2025-53771 is path traversal vulnerability caused by improper limitation of a path name to a restricted directory. It affects Microsoft Office SharePoint and allows an authorized attacker to perform spoofing over a network.
The two vulnerabilities are actively exploited. They are the result of an exploit bypassing the patching of vulnerabilities CVE-2025-49704 and CVE-2025-49706, also known as ToolShell. Systems that already applied the July Patch Tuesday at time of publication are not safe. The emergency patch needs to be applied.
Patch
The Centre for Cybersecurity Belgium strongly recommends, to follow Microsoft’s emergency guidance:
In case of a compromise:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
Multiple sources are providing Indicators of Compromises and instructions for monitoring:
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
CISA - https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770
Sophos - https://news.sophos.com/en-us/2025/07/21/sharepoint-toolshell-vulnerabilities-being-exploited-in-the-wild/
Palo Alto Networks IOCs - https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2025-07-19-Microsoft-SharePoint-vulnerabilities-CVE-2025-49704-and-49706.txt
Neo23x0 Yara Rule - https://github.com/Neo23x0/signature-base/blob/master/yara/expl_sharepoint_jul25.yar#L3
CCB IOC package (password:infected) - https://fedsender.belnet.be/?s=download&token=d4f4cd66-d365-4702-a9a6-30e301755cef