The Cloudflare Blog: Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770

Source URL: https://blog.cloudflare.com/cloudflare-protects-against-critical-sharepoint-vulnerability-cve-2025-53770/
Source: The Cloudflare Blog
Title: Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770

Feedly Summary: Microsoft disclosed two critical vulnerabilities, CVE-2025-53771 and CVE-2025-53770, that are exploited to attack SharePoint servers.

AI Summary and Description: Yes

**Summary:** The text discusses the critical CVE-2025-53770 vulnerability in Microsoft SharePoint that allows remote code execution and highlights its sophisticated exploit chain, ToolShell. It emphasizes the importance of immediate remediation, particularly through Cloudflare’s Web Application Firewall (WAF) Managed Rules to mitigate the threat posed by this vulnerability.

**Detailed Description:**
The text provides in-depth information about CVE-2025-53770, a critical vulnerability affecting multiple versions of Microsoft SharePoint that allows remote code execution due to improper deserialization of untrusted data. Key aspects of the text include:

– **Vulnerability Overview:**
– CVE-2025-53770 has a CVSS base score of 9.8, marking it as critical.
– It affects SharePoint Server versions 2016, 2019, and the Subscription Edition, as well as older unsupported versions.
– An emergency response was initiated by CISA, adding this vulnerability to its Known Exploited Vulnerabilities catalog with a remediation deadline.

– **Exploit Methodology (ToolShell):**
– ToolShell combines initial exploitation through an authentication bypass (CVE-2025-53771) with a mechanism for long-term access.
– Attackers can steal cryptographic machine keys (ValidationKey and DecryptionKey), allowing for persistent access and manipulation of tokens.

– **Exploit Chain Phases:**
– **Stage 1 – Authentication Bypass:** Attackers trick SharePoint into trusting them by manipulating HTTP headers.
– **Stage 2 – Remote Code Execution:** By sending malicious payloads to the ToolPane.aspx endpoint, attackers exploit the deserialization flaw to execute arbitrary commands.
– **Stage 3 – Key Theft:** Attackers capture machine keys to establish long-term access, enabling new payload executions even after initial defenses are placed.

– **Mitigation Strategies:**
– Cloudflare has developed and released emergency WAF Managed Rules to provide immediate protections against these vulnerabilities.
– Continuous monitoring of HTTP requests for this vulnerability is crucial for identifying potential exploitation attempts.

This detailed analysis underscores the ongoing challenges in cybersecurity, highlighting how attackers evolve their strategies while reinforcing the necessity for proactive and adaptive security measures in both corporate networks and cloud environments. The urgent remediation directives and the capabilities of tools like Cloudflare’s WAF illustrate the collaborative effort needed among security professionals to combat these sophisticated threats.