spot_img

Date:

Share:

Kaspersky reveals SharePoint ToolShell vulnerabilities stem from incomplete 2020 fix

Kaspersky’s Global Research and Analysis Team (GReAT) discovered that the recently exploited ToolShell vulnerabilities in Microsoft SharePoint originate from an incomplete fix for CVE-2020-1147, first reported in 2020.

The SharePoint vulnerabilities have emerged as a major cybersecurity threat this year amid active exploitation. Kaspersky Security Network showed exploitation attempts worldwide, including in Egypt, Jordan, Russia, Vietnam and Zambia. The attacks target organisations across government, finance, manufacturing, forestry and agriculture sectors. Kaspersky solutions proactively detected and blocked ToolShell attacks before the vulnerabilities were publicly disclosed.

Kaspersky GReAT researchers analysed the published ToolShell exploit and found it alarmingly similar to the 2020 CVE-2020-1147 exploit. This suggests that the CVE-2025-53770 patch is, in fact, an effective fix for the vulnerability that CVE-2020-1147 attempted to address five years ago.

The connection to CVE-2020-1147 became evident following the discovery of CVE-2025-49704 and CVE-2025-49706, patched on July 8. However, these fixes could be bypassed by adding a single forward slash to the exploit payload. Once Microsoft learned of active exploitation of these vulnerabilities, they responded with comprehensive patches that addressed potential bypass methods, designating the vulnerabilities as CVE-2025-53770 and CVE-2025-53771. The surge in attacks against SharePoint servers worldwide occurred during the window between initial exploitation and full patch deployment.

Despite patches now being available for the ToolShell vulnerabilities, Kaspersky expects attackers will continue exploiting this chain for years to come.

“Many high-profile vulnerabilities remain actively exploited years after discovery — ProxyLogon, PrintNightmare and EternalBlue still compromise unpatched systems today. We expect ToolShell to follow the same pattern: its ease of exploitation means the public exploit will soon appear in popular penetration testing tools, ensuring prolonged use by attackers,” said Boris Larin, principal security researcher at Kaspersky GReAT.

To stay safe, Kaspersky recommends:

  • Organisations using Microsoft SharePoint must apply the latest security patches immediately. This applies to all high-risk vulnerabilities, as even brief exposure can lead to compromise.
  • Deploy cybersecurity solutions that protect against zero-day exploits when patches aren’t yet available. Kaspersky Next, with its Behavior Detection component, proactively blocks exploitation of such vulnerabilities.
spot_img
spot_img

━ More like this

Kaspersky identified a new SilverFox campaign targeting companies in South Africa

The APT campaign involved disguising malicious files as documents related to tax violations. Upon infection, attackers could gain remote access to affected devices and...

The energy sector’s ‘digital big bang’: 75% to digitise in two years, but at what cost?

A recent joint study by Kaspersky and VDC revealed that over half of energy organisations have already faced cyber incidents exceeding $1 million in...

Gaps in cybersecurity policies and employee commitment leave organisations vulnerable, Kaspersky survey shows

A recent Kaspersky survey in the Middle East, Turkiye and Africa (META) region entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that 23%...

69% of businesses ready to share their contractors’ security costs to boost cyber resilience

A new global Kaspersky study has revealed that more than two-thirds of companies are willing to invest in the security of their contractors and...

Why your password may not be good enough no matter how long and complex it is

The first Thursday of May each year marks ‘World Password Day’, a global event dedicated to raising awareness about the importance of securing passwords...
spot_img