"We’re witnessing an urgent and active threat" — Microsoft SharePoint "ToolShell" vulnerability is being attacked globally

UKRAINE - 2022/01/11: In this photo illustration, the Microsoft SharePoint logo is seen displayed on a smartphone and Microsoft logo in the background. (Photo Illustration by Igor Golovniov/SOPA Images/LightRocket via Getty Images)
A vulnerability in SharePoint is being actively exploited by attackers. (Image credit: Getty Images |SOPA Images)

Global attacks forced Microsoft to push emergency updates to address vulnerabilities. Two zero-day vulnerabilities are at the center of attacks against United States federal and state agencies, universities, and energy companies. An Asian telecommunications company was also attacked.

The Washington Post reported on the attacks, which were first discovered on July 18, 2025 by Eye Security. It has since been determined by cyber security company Check Point that the first signs of exploitation were on July 7, 2025.

That same post also discussed issues labeled CVE‑2025‑49704 and CVE‑2025‑49706, which were fixed with the July 8, 2025 updates from Microsoft. Those vulnerabilities can still, however, be exploited if an attacker uses the newly discovered exploits.

What is ToolShell?

ToolShell is the nickname for the attacks targeting the vulnerabilities tracked as CVE-2025-53770 and CVE-2025-53771. Those vulnerabilities are under "active exploitation," according to Check Point.

Lotem Finkelstein, Director of Threat Intelligence at Check Point Research, discussed the situation:

“We’re witnessing an urgent and active threat: a critical zero-day in SharePoint on-prem is being exploited in the wild, putting thousands of global organizations at risk. Our team has confirmed dozens of compromise attempts across government, telecom, and tech sectors since July 7. We strongly urge enterprises to update their security systems immediately — this campaign is both sophisticated and fast-moving.”

Check Point recommends organizations take the following steps to reduce risk:

  • Ensure that your Anti-Malware Scan Interface is enabled.
  • Rotate SharePoint Server ASP.NET machine keys.
  • Deploy Harmony Endpoint to block post-exploit activities on the server.
  • If applicable, limit access to the SharePoint Server from the Internet using Private Access tools.
  • Update Quantum Gateway IPS Package 635254838 and ensure that the protection is set to Prevent and inspect the traffic of your SharePoint servers.

Microsoft recommends several steps for mitigation, including applying patches immediately where updates exist. The company also suggests enabling Antimalware Scan Interface (AMSI), rotating MachineKey twice, temporarily removing public exposure, hunting for indicators, and isolating suspected hosts.

Sean Endicott
News Writer and apps editor

Sean Endicott is a news writer and apps editor for Windows Central with 11+ years of experience. A Nottingham Trent journalism graduate, Sean has covered the industry’s arc from the Lumia era to the launch of Windows 11 and generative AI. Having started at Thrifter, he uses his expertise in price tracking to help readers find genuine hardware value.

Beyond tech news, Sean is a UK sports media pioneer. In 2017, he became one of the first to stream via smartphone and is an expert in AP Capture systems. A tech-forward coach, he was named 2024 BAFA Youth Coach of the Year. He is focused on using technology—from AI to Clipchamp—to gain a practical edge.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.