- **Q: What is CVE-2025-53770?
**
Vulnerabilities / Zero Day
A critical zero-day vulnerability, CVE-2025-53770, is actively being exploited in Microsoft SharePoint Server, leading to widespread breaches. This flaw allows unauthenticated remote code execution, granting attackers significant control ov...
The CVE-2025-53770 vulnerability stems from SharePoint's deserialization of untrusted data, allowing attackers to execute commands even before authentication. Once inside, they can forge trusted payloads using stolen machine keys to persist and move laterally. This makes detection and response particularly difficult.
Eye Security discovered that attackers are using a stealthy `spinstall0.aspx` file to extract cryptographic secrets from the SharePoint server. These secrets, including the ValidationKey and DecryptionKey, are crucial for generating valid __VIEWSTATE payloads, effectively turning any authenticated SharePoint request into a remote code execution opportunity.
Microsoft recommends that, in the absence of a patch, users should configure AMSI integration in SharePoint and deploy Defender AV on all SharePoint servers. If enabling AMSI is not an option, disconnecting the SharePoint server from the internet is advised.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert, urging organizations with on-premise Microsoft SharePoint servers to take immediate action.
**
**
**
**
Do you think these mitigation steps are sufficient to protect against the exploit until a patch is released? Let us know in the comments below!
Share this article with others who need to stay ahead of this trend!
This article was compiled by Yanuki using publicly available data and trending information. The content may summarize or reference third-party sources that have not been independently verified. While we aim to provide timely and accurate insights, the information presented may be incomplete or outdated.
All content is provided for general informational purposes only and does not constitute financial, legal, or professional advice. Yanuki makes no representations or warranties regarding the reliability or completeness of the information.
This article may include links to external sources for further context. These links are provided for convenience only and do not imply endorsement.
Always do your own research (DYOR) before making any decisions based on the information presented.