<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Office SharePoint — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/office-sharepoint/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:43:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/office-sharepoint/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40368 - Microsoft Office SharePoint Deserialization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-sharepoint-deserialization/</link><pubDate>Tue, 12 May 2026 18:43:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sharepoint-deserialization/</guid><description>CVE-2026-40368 is a deserialization of untrusted data vulnerability in Microsoft Office SharePoint, allowing an authorized attacker to execute code over a network.</description><content:encoded><![CDATA[<p>CVE-2026-40368 describes a deserialization vulnerability affecting Microsoft Office SharePoint. This vulnerability allows an authorized attacker to execute arbitrary code over a network by deserializing untrusted data. The vulnerability stems from how SharePoint handles incoming data streams, potentially allowing malicious code to be injected during the deserialization process. Successful exploitation could lead to complete system compromise. Defenders should prioritize patching vulnerable SharePoint instances to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a SharePoint instance with valid credentials.</li>
<li>The attacker crafts a malicious payload containing serialized data designed to exploit the deserialization vulnerability.</li>
<li>The attacker injects the malicious payload into a SharePoint component that processes serialized data, such as a web part or workflow.</li>
<li>SharePoint attempts to deserialize the untrusted data without proper validation.</li>
<li>The deserialization process executes the attacker&rsquo;s injected code.</li>
<li>The attacker gains arbitrary code execution within the context of the SharePoint application pool account.</li>
<li>The attacker can then escalate privileges, move laterally within the network, and compromise other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40368 allows an attacker to execute arbitrary code on the affected Microsoft Office SharePoint server. The vulnerability has a CVSS v3.1 score of 8.0, indicating a high severity. This could lead to unauthorized access to sensitive data, modification of SharePoint content, or complete compromise of the server and potentially the entire network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-40368 on all affected SharePoint servers (reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40368)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40368)</a>.</li>
<li>Monitor SharePoint logs for suspicious activity related to deserialization processes, looking for unusual patterns or error messages.</li>
<li>Implement strict input validation and sanitization measures to prevent the injection of malicious serialized data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>deserialization</category><category>code-execution</category><category>sharepoint</category></item><item><title>CVE-2026-40365: Microsoft Office SharePoint Insufficient Access Control RCE</title><link>https://feed.craftedsignal.io/briefs/2026-05-sharepoint-rce/</link><pubDate>Tue, 12 May 2026 18:35:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sharepoint-rce/</guid><description>CVE-2026-40365 is a vulnerability in Microsoft Office SharePoint that allows an authorized attacker to execute code over a network due to insufficient granularity of access control.</description><content:encoded><![CDATA[<p>CVE-2026-40365 describes a vulnerability in Microsoft Office SharePoint that stems from insufficient granularity of access control. This flaw allows an authorized attacker to execute arbitrary code remotely over a network. Given the widespread use of SharePoint in enterprise environments, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive data, modification of critical systems, or disruption of business operations. Defenders should prioritize patching and consider implementing additional security measures to mitigate this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to a SharePoint instance with compromised or legitimate credentials.</li>
<li>Attacker leverages their authorized access to target specific SharePoint components with insufficient access controls.</li>
<li>Attacker crafts a malicious request to exploit the insufficient access control vulnerability.</li>
<li>The malicious request bypasses intended security checks due to the granularity issue.</li>
<li>The vulnerable SharePoint component processes the malicious request, leading to code execution.</li>
<li>Attacker executes arbitrary code within the context of the SharePoint server.</li>
<li>Attacker establishes persistence through techniques like creating scheduled tasks or modifying system files.</li>
<li>Attacker pivots to other systems on the network to achieve broader objectives, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40365 allows a remote attacker to execute arbitrary code on a vulnerable Microsoft Office SharePoint server. The impact includes potential compromise of sensitive data, disruption of services, and further exploitation of the internal network. Due to the insufficient granularity of access controls, an attacker with relatively low privileges could gain elevated privileges, leading to a full system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-40365 as soon as possible (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40365)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40365)</a>.</li>
<li>Monitor SharePoint servers for suspicious activity, such as unauthorized code execution or unexpected network connections.</li>
<li>Implement the Sigma rule provided to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>sharepoint</category><category>rce</category></item><item><title>CVE-2026-33110 - Microsoft SharePoint Deserialization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-33110-sharepoint-deserialization/</link><pubDate>Tue, 12 May 2026 18:18:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-33110-sharepoint-deserialization/</guid><description>CVE-2026-33110 is a deserialization of untrusted data vulnerability in Microsoft Office SharePoint, allowing an authorized attacker to achieve remote code execution over a network.</description><content:encoded><![CDATA[<p>CVE-2026-33110 is a critical vulnerability affecting Microsoft Office SharePoint. The vulnerability stems from the deserialization of untrusted data, which can be exploited by an authorized attacker to achieve remote code execution (RCE) on the affected system. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code within the context of the SharePoint application, potentially leading to complete system compromise. The vulnerability was published on 2026-05-12 and requires an attacker to be authenticated, but requires no user interaction. This RCE vulnerability can allow attackers to pivot to other systems and gain access to sensitive data within the organization.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authorized attacker gains initial access to the SharePoint environment via valid credentials.</li>
<li>The attacker crafts a malicious payload containing serialized data designed to exploit the deserialization vulnerability (CVE-2026-33110).</li>
<li>The attacker injects the malicious payload into a SharePoint component that processes serialized data.</li>
<li>When SharePoint processes the crafted input, it attempts to deserialize the data.</li>
<li>The deserialization process triggers the execution of arbitrary code embedded within the malicious payload.</li>
<li>The attacker&rsquo;s code executes with the privileges of the SharePoint application pool.</li>
<li>The attacker leverages the code execution to install a webshell for persistent access or perform lateral movement.</li>
<li>The attacker uses the compromised SharePoint server as a pivot point to access other systems on the network and exfiltrate sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33110 can lead to complete compromise of the SharePoint server, potentially impacting all sites and data hosted on the platform. An attacker could gain access to sensitive documents, modify content, or disrupt services for all users. Due to the central role SharePoint often plays in document management and collaboration, this vulnerability represents a significant risk to data confidentiality, integrity, and availability within an organization. The vulnerability could also be used as a stepping stone to compromise other systems within the network, leading to a widespread security breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to address CVE-2026-33110 on all affected SharePoint servers immediately. Refer to the Microsoft Security Response Center (MSRC) advisory for specific patching instructions: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33110">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33110</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect SharePoint Suspicious Deserialization Attempt&rdquo; to identify potential exploitation attempts based on unusual process execution.</li>
<li>Monitor SharePoint logs for suspicious activity related to deserialization processes as an additional layer of defense.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>deserialization</category><category>rce</category><category>sharepoint</category></item></channel></rss>