CISA Alerts on Active Exploitation of Microsoft SharePoint Zero-Day Vulnerabilities by Chinese Hackers

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the active exploitation of critical vulnerabilities in Microsoft SharePoint by suspected Chinese state-sponsored threat actors. This sophisticated attack campaign, known as ToolShell, leverages a combination of vulnerabilities—specifically CVE-2025-49706 (network spoofing) and CVE-2025-49704 (remote code execution)—to gain unauthorized access to on-premises SharePoint servers.

Understanding the Vulnerabilities

CVE-2025-49706 is a network spoofing vulnerability that allows attackers to impersonate legitimate network entities, thereby bypassing authentication mechanisms. CVE-2025-49704 is a remote code execution flaw that enables malicious actors to execute arbitrary code on the affected server. When exploited together, these vulnerabilities provide attackers with both unauthenticated and authenticated access to SharePoint servers, facilitating full control over the system.

Scope and Impact of the Exploitation

The exploitation of these vulnerabilities has been ongoing since at least July 7, 2025. Microsoft has identified that three China-based hacking groups, including two linked to the Chinese government—Linen Typhoon and Violet Typhoon—have been actively exploiting these flaws. These groups are known for their focus on espionage and intellectual property theft. ([axios.com](https://www.axios.com/2025/07/22/microsoft-china-sharepoint-cyberattacks?utm_source=openai))

The attacks have primarily targeted on-premises SharePoint servers, excluding those hosted in Microsoft’s cloud-based service. Affected sectors include U.S. federal and state entities, universities, energy companies, and governments in Europe and the Middle East. Notably, the U.S. National Nuclear Security Administration was among those affected, though no classified data is believed to have been compromised. ([ft.com](https://www.ft.com/content/e9dca56d-5a38-463b-8abb-70f4c635da7b?utm_source=openai))

Microsoft’s Response and Additional Vulnerabilities

In response to the active exploitation, Microsoft released emergency security updates on July 22, 2025, addressing the primary vulnerabilities. However, subsequent analysis revealed two additional patch bypass vulnerabilities: CVE-2025-53771 and CVE-2025-53770. These flaws could potentially circumvent the initial fixes, allowing attackers to maintain access to compromised systems. ([securityweek.com](https://www.securityweek.com/microsoft-says-chinese-apts-exploited-toolshell-zero-days-weeks-before-patch/?utm_source=openai))

CISA’s Recommendations and Mitigation Strategies

CISA has provided specific indicators of compromise for organizations to monitor. Security teams should watch for suspicious POST requests to the endpoint /_layouts/15/ToolPane.aspx?DisplayMode=Edit, identified as a primary attack vector. Additionally, organizations must scan for connections from specific IP addresses, particularly focusing on activity between July 18-19, 2025.

To mitigate the threat, organizations are strongly advised to:

– Apply Security Updates: Implement Microsoft’s latest security patches immediately to address the identified vulnerabilities.

– Configure AMSI: Enable the Antimalware Scan Interface within SharePoint environments to enhance detection capabilities.

– Rotate Machine Keys: Rotate ASP.NET machine keys both before and after applying patches, followed by restarting IIS web servers to ensure complete protection.

– Enhance Monitoring: Implement comprehensive logging capabilities and update intrusion prevention systems (IPS) and web application firewall (WAF) rules to detect and block exploit patterns.

– Isolate Vulnerable Systems: Disconnect end-of-life SharePoint versions, such as SharePoint Server 2013, from internet-facing networks to prevent exploitation.

Broader Implications and Ongoing Threats

The exploitation of these SharePoint vulnerabilities underscores the persistent threat posed by state-sponsored cyber actors. The Chinese government has denied involvement, condemning accusations without concrete evidence. ([axios.com](https://www.axios.com/2025/07/22/microsoft-china-sharepoint-cyberattacks?utm_source=openai))

This incident follows a series of high-profile breaches involving Microsoft software, notably a 2023 attack on Microsoft Exchange Online by Chinese group Storm-0558. U.S. experts link this to China’s increasingly aggressive cyber espionage, attributing China’s persistence to a lack of international penalties and high intelligence gains. ([ft.com](https://www.ft.com/content/e9dca56d-5a38-463b-8abb-70f4c635da7b?utm_source=openai))

Cybersecurity experts stress the urgency of timely and effective vulnerability management. Failed patches happen occasionally and highlight the importance of comprehensive security measures. ([reuters.com](https://www.reuters.com/sustainability/boards-policy-regulation/microsoft-knew-sharepoint-security-flaw-failed-effectively-patch-it-timeline-2025-07-22/?utm_source=openai))

Conclusion

The active exploitation of Microsoft SharePoint vulnerabilities by suspected Chinese state-sponsored actors highlights the critical need for organizations to remain vigilant and proactive in their cybersecurity efforts. By promptly applying security updates, configuring detection mechanisms, and implementing robust monitoring strategies, organizations can mitigate the risks associated with these sophisticated cyber threats.