About:
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
CVSS Score: 9.8 (Critical)
Identifier: CVE-2025-53770
Exploit or POC: Yes – confirmed active exploit in the wild targeting on-premise SharePoint servers
Update: CVE-2025-53770 – Microsoft Security Advisory
Description: CVE-2025-53770 is a critical deserialization vulnerability in on-premisesise Microsoft SharePoint Server. Attackers exploit it by sending specially crafted POST requests to /_layouts/15/ToolPane.aspx?DisplayMode=Edit, enabling unauthenticated remote code execution. Known as "ToolShell," the flaw has resulted in widespread compromises, affecting at least 75 servers, including government, education, and enterprise systems. Exploitation has involved planting web shells (e.g., spinstall0.aspx), extracting ASP.NET machine keys, and deploying post-exploitation tools like encoded PowerShell via w3wp.exe. The vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog with remediation required by July 21, 2025.
Mitigation Recommendation:
Note: This is a high-impact zero-day with real-world exploitation, broad compromise potential, and active adversary use. On-prem SharePoint instances represent critical assets; prompt patching, isolation, and forensic analysis are essential to prevent further intrusion and data exposure.