Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

A new approach to the challenges of 10 years ago

How feasible is dual-used space technology?

Google launches OSS Rebuild to expose malicious code in widely used open source packages

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA orders emergency patch after Chinese hackers exploit SharePoint flaws in live attacks
Identity

CISA orders emergency patch after Chinese hackers exploit SharePoint flaws in live attacks

userBy userJuly 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 23, 2025Ravi LakshmananVulnerability/Threat Intelligence

On July 22, 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) added two Microsoft SharePoint Flaws, CVE-2025-49704 and CVE-2025-49706, to its known available vulnerabilities (KEV) catalog, based on evidence of active exploitation.

Therefore, a Federal Civil Enforcement Division (FCEB) agency is required to fix the vulnerabilities identified by July 23, 2025.

“CISA recognizes the aggressive exploitation of spoofing and RCE vulnerability chains, including CVE-2025-49706 and CVE-2025-49704, allowing unauthorized access to on-premises SharePoint servers.”

Cybersecurity

The inclusion of two drawbacks to the KEV catalog, the spoofing vulnerabilities and the remote code execution vulnerabilities, came after Microsoft revealed that Chinese hacking groups such as Linen Typhoon and Violet Typhoon had exploited these flaws to violate SharePoint Servers since July 7, 2025.

At the time of writing, Tech Giant’s own advisory lists only CVE-2025-53770 as being misused in the wild. Furthermore, it explains the four defects as follows:

CVE-2025-49704 – SharePoint Remote Code Execution CVE-2025-49706 – SharePoint Post-Auth Remote Code Execution CVE-2025-53770 – SharePoint Tool Shell Authentication Bypass and Remote Code Execution CVE-2025-53771

The fact that CVE-2025-53770 is both an authentication bypass and a remote code execution bug indicates that CVE-2025-53771 is not required to build an Exploit chain. CVE-2025-53770 and CVE-2025-53771 are rated as patch bypasses for CVE-2025-49704 and CVE-2025-49706, respectively.

“The root cause [of CVE-2025-53770] Akamai Security Intelligence Group said:

When we reached comments on the exploitation status of CVE-2025-53771 and other flaws, a Microsoft spokesperson told Hacker News that the information published in the recommendation was correct “at the time of its original publication” and that post-release releases would not be updated.

“Microsoft is also supporting CISA with a known exploited vulnerability catalog.

Cybersecurity

As Watchtowr Labs told the publication, the development internally devised a method to utilize CVE-2025-53770, and bypassed the mitigation step, Antimalware Scan Interface (AMSI) to alleviate the mitigation step that Microsoft said was called.

“This allowed us to continue identifying vulnerable systems even after mitigation like AMSI was applied,” said Watchtowr CEO Benjamin Harris. “AMSI was never a silver bullet, and this outcome was inevitable. However, I’ve heard that some organizations have chosen to “enable AMSI” instead of patching it. This is a very bad idea. ”

“It’s naive to think that, now, exploitation is linked to national state actors, but somehow you can’t bypass AMSI. Not to mention the organization, I believe that all POCs will cause AMSI and organizations will be misleading.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleApple warned Iranians against iPhone spyware attacks, researchers say
Next Article Sysaid flaws under active attacks enable remote file access and SSRF
user
  • Website

Related Posts

A new approach to the challenges of 10 years ago

July 23, 2025

Google launches OSS Rebuild to expose malicious code in widely used open source packages

July 23, 2025

Sysaid flaws under active attacks enable remote file access and SSRF

July 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A new approach to the challenges of 10 years ago

How feasible is dual-used space technology?

Google launches OSS Rebuild to expose malicious code in widely used open source packages

Global CCS Institute on the rise of carbon capture and storage

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.