<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sharepoint — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sharepoint/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 08:51:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sharepoint/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Unauthenticated RCE Vulnerability Exploited in Microsoft SharePoint</title><link>https://feed.craftedsignal.io/briefs/2026-03-sharepoint-rce/</link><pubDate>Wed, 25 Mar 2026 08:51:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-sharepoint-rce/</guid><description>A remote code execution vulnerability in Microsoft SharePoint (CVE not specified) is being actively exploited by unauthenticated attackers, prompting urgent patching recommendations for internet-facing servers.</description><content:encoded><![CDATA[<p>On March 17, 2026, Microsoft revised a January 2026 security advisory concerning a remote code execution (RCE) vulnerability in Microsoft SharePoint. The update included a heightened CVSS score and a clarification indicating that the vulnerability could be exploited by unauthenticated attackers. This exploitability led to its inclusion in CISA&rsquo;s Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026. The advisory also mentions that three additional RCE vulnerabilities in Microsoft SharePoint were addressed in the March 2026 update. Given the active exploitation and the potential for significant impact, defenders should prioritize patching internet-facing SharePoint instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable, internet-facing SharePoint server.</li>
<li>The attacker crafts a malicious HTTP request targeting the RCE vulnerability.</li>
<li>The SharePoint server processes the request without proper authentication or input validation.</li>
<li>The attacker injects a payload, such as a web shell, into the SharePoint server&rsquo;s process.</li>
<li>The injected payload executes arbitrary code within the context of the SharePoint application pool account.</li>
<li>The attacker leverages the web shell for remote access and reconnaissance within the SharePoint environment.</li>
<li>The attacker attempts to escalate privileges within the compromised server or the Active Directory domain.</li>
<li>The attacker moves laterally within the network, potentially targeting sensitive data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to execute arbitrary code on vulnerable Microsoft SharePoint servers. The impact includes potential data breaches, system compromise, and lateral movement within the network. Given the widespread use of SharePoint in enterprise environments, a successful attack could lead to significant disruption and financial losses, especially if attackers deploy ransomware or exfiltrate sensitive information. The specific number of affected organizations is currently unknown, but CERT-EU emphasizes the critical need for immediate patching.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all Microsoft SharePoint servers, prioritizing internet-facing assets, as recommended by CERT-EU.</li>
<li>Implement the provided Sigma rule (<code>SharePoint_Suspicious_Process</code>) to detect suspicious process creation by the SharePoint application pool account.</li>
<li>Monitor web server logs for unusual HTTP requests targeting SharePoint servers that could indicate exploitation attempts (refer to the <code>SharePoint_Unauth_RCE</code> Sigma rule).</li>
<li>Review and harden SharePoint server configurations to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sharepoint</category><category>rce</category><category>vulnerability</category></item><item><title>Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)</title><link>https://feed.craftedsignal.io/briefs/2026-03-sharepoint-deserialization/</link><pubDate>Fri, 20 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-sharepoint-deserialization/</guid><description>CVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.</description><content:encoded>&lt;p>On March 18, 2026, CISA added CVE-2026-20963, a SharePoint deserialization vulnerability, to its Known Exploited Vulnerabilities catalog, signaling active exploitation in the wild. This vulnerability allows attackers to execute arbitrary code on affected SharePoint servers through the deserialization of untrusted data. Organizations utilizing SharePoint are urged to apply the necessary patches promptly. Beyond patching, it&amp;rsquo;s crucial to conduct a thorough audit of SharePoint assets, particularly…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-20963</category><category>sharepoint</category><category>deserialization</category><category>cisa-kev</category></item></channel></rss>