{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-20963/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["critical"],"_cs_tags":["CVE-2026-20963","sharepoint","deserialization","cisa-kev"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eOn March 18, 2026, CISA added CVE-2026-20963, a SharePoint deserialization vulnerability, to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild. This vulnerability allows attackers to execute arbitrary code on affected SharePoint servers through the deserialization of untrusted data. Organizations utilizing SharePoint are urged to apply the necessary patches promptly. Beyond patching, it\u0026rsquo;s crucial to conduct a thorough audit of SharePoint assets, particularly…\u003c/p\u003e\n","date_modified":"2026-03-20T12:00:00Z","date_published":"2026-03-20T12:00:00Z","id":"/briefs/2026-03-sharepoint-deserialization/","summary":"CVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.","title":"Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)","url":"https://feed.craftedsignal.io/briefs/2026-03-sharepoint-deserialization/"}],"language":"en","title":"CraftedSignal Threat Feed — CVE-2026-20963","version":"https://jsonfeed.org/version/1.1"}