Microsoft’s Emergency Patch Party: SharePoint Servers Under Siege in “ToolShell” Chaos

Microsoft has released emergency patches for SharePoint zero-days exploited in “ToolShell” attacks. The SharePoint zero-day vulnerability CVE-2025-53770 is currently being exploited, with attackers running commands pre-authentication. Microsoft advises enabling AMSI integration and deploying Microsoft Defender to protect against these vulnerabilities.

Pro Dashboard

Hot Take:

Microsoft’s SharePoint servers are feeling more heat than a summer barbecue, as the company scrambles to patch a couple of feisty zero-day vulnerabilities. Dubbed “ToolShell,” these exploits are wreaking havoc on on-premises servers like a toddler in a candy store, leaving IT professionals with more headaches than a broken air conditioner in July. It’s a classic case of “patch or perish” as Microsoft urges everyone to batten down the hatches and deploy the necessary mitigations faster than a cat on a hot tin roof. SharePoint Online users can sit back and relax with their popcorn, while on-prem servers get the emergency treatment they desperately need. Grab your security blankets, folks; it’s going to be a bumpy ride!

Key Points:

– Microsoft has released emergency patches for two zero-day vulnerabilities in SharePoint, CVE-2025-53770 and CVE-2025-53771.
– The “ToolShell” attacks exploit these flaws, with CVE-2025-53770 being actively used in the wild.
– Both vulnerabilities impact only on-premises SharePoint servers, not SharePoint Online in Microsoft 365.
– Attackers use these vulnerabilities to execute remote commands and move laterally, making detection tough.
– Microsoft emphasizes the importance of enabling AMSI integration and deploying Microsoft Defender for protection.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?