Vulnerability exploited on MS SharePoint servers: All you need to know

Security researchers warn that the exploit, reportedly known as ToolShell, is a serious one and can allow actors to fully access SharePoint file systems

Hackers, cybercrime, cyber crimes
Google's Threat Intelligence Group warned that the vulnerability may allow bad actors to bypass future patching. | Image: Bloomberg
AP New York
3 min read Last Updated : Jul 22 2025 | 8:24 AM IST

Don't want to miss the best from Business Standard?

Microsoft has issued an emergency fix to close off a vulnerability in Microsoft's widely-used SharePoint software that hackers have exploited to carry out widespread attacks on businesses and at least some US government agencies.

The company issued an alert to customers Saturday saying it was aware of the zero-day exploit being used to conduct attacks and that it was working to patch the issue. Microsoft updated its guidance Sunday with instructions to fix the problem for SharePoint Server 2019 and SharePoint Server Subscription Edition. 

ALSO READ: Microsoft warns govt, firms of cyberattacks on document-sharing software 

Engineers were still working on a fix for the older SharePoint Server 2016 software.

Anybody who's got a hosted SharePoint server has got a problem, said Adam Meyers, senior vice president with CrowdStrike, a cybersecurity firm. It's a significant vulnerability.

Companies and government agencies around the world use SharePoint for internal document management, data organization and collaboration.

What is a zero-day exploit?

A zero-day exploit is a cyberattack that takes advantage of a previously unknown security vulnerability. "Zero-day" refers to the fact that the security engineers have had zero days to develop a fix for the vulnerability.

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the exploit affecting SharePoint is "a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations with on-premise SharePoint servers. 

Security researchers warn that the exploit, reportedly known as ToolShell, is a serious one and can allow actors to fully access SharePoint file systems, including services connected to SharePoint, such as Teams and OneDrive.

Google's Threat Intelligence Group warned that the vulnerability may allow bad actors to "bypass future patching.

How widespread is the impact?

Eye Security said in its blog post that it scanned over 8,000 SharePoint servers worldwide and discovered that at least dozens of systems were compromised. The cybersecurity company said the attacks likely began on July 18.

Microsoft said the vulnerability affects only on-site SharePoint servers used within businesses or organizations, and does not affect Microsoft's cloud-based SharePoint Online service. 

But Michael Sikorski, CTO and Head of Threat Intelligence for Unit 42 at Palo Alto Networks, warns that the exploit still leaves many potentially exposed to bad actors.

While cloud environments remain unaffected, on-prem SharePoint deployments particularly within government, schools, health care including hospitals, and large enterprise companies are at immediate risk."

What do you do now?

The vulnerability targets SharePoint server software so customers of that product will want to immediately follow Microsoft's guidance to patch their on-site systems.

Although the scope of the attack is still being assessed, CISA warned that the impact could be widespread and recommended that any servers impacted by the exploit should be disconnected from the internet until they are patched.

We are urging organisations who are running on-prem SharePoint to take action immediately and apply all relevant patches now and as they become available, rotate all cryptographic material, and engage professional incident response. An immediate, band-aid fix would be to unplug your Microsoft SharePoint from the internet until a patch is available, Sikorski advises.

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :MicrosoftHackingcybersecurityCyber threat

First Published: Jul 22 2025 | 8:24 AM IST

Next Story