top of page

New SharePoint Security Flaw Exposes Businesses

A new critical zero-day vulnerability in Microsoft SharePoint Server is being actively exploited in a global cyberattack campaign. Exploited in the wild and listed under CVE-2025-53770, over 85 servers across 54 organisations have been compromised, including governments, multinational firms and banks.


The flaw allows attackers to run malicious code remotely without any login or authentication and currently, no official patch exists.


SharePoint logo on a blue background, featuring a green and teal abstract shape next to the text "SharePoint" in white.

If your business relies on SharePoint for document storage or internal collaboration, here’s what you need to know and why some SMEs are moving towards VDI (Virtual Desktop Infrastructure) instead.


What Is CVE-2025-53770 and Why It Matters

Dubbed “ToolShell”, the exploit allows attackers to:


  • Execute remote code without login credentials

  • Install persistent backdoors (web shells)

  • Steal cryptographic keys from your SharePoint server

  • Forge tokens to stay inside your system — even after updates are applied


Unlike previous vulnerabilities, this exploit bypasses authentication entirely. It is a variant of a spoofing flaw (CVE-2025-49706) previously patched, but this version is new and unpatched.


Person using a laptop displaying "File Compromised" with a red exclamation mark. Wooden table, blurred background, suggesting concern.

🔒 Who’s Affected?

  • NOT affected: Microsoft 365 users using SharePoint Online

  • At risk: On-premises Microsoft SharePoint Server (any version still in use internally)

  • ❗️Especially at risk: Servers exposed to the internet, or not running antivirus with AMSI (Antimalware Scan Interface)


Eye Security, the Dutch firm that first observed the attacks, warned that attackers are “moving quickly using this RCE vulnerability” and targeting government and private-sector infrastructure alike.

⚠️ What SMEs Should Know and Do Now

Many small to mid-sized businesses are still running local SharePoint servers, often inherited from older IT builds, under the assumption they’re “secure because they’re internal.” This exploit disproves that.


If you're in that group:


🔧 Microsoft’s Recommendations (as of 15 July 2025):

  • Immediately enable AMSI (Antimalware Scan Interface) on all SharePoint Servers

  • Deploy Microsoft Defender Antivirus with real-time scanning

  • Disconnect servers from the internet if AMSI cannot be configured

  • Monitor systems for suspicious file uploads, unknown processes or outbound connections


Even cloud-based SharePoint setups depend heavily on correct admin configurations. One misstep can leave sensitive client documents, HR records, or financial data exposed.



Man looking worried at SharePoint logo and large warning sign on blue background. Text reads "WARNING!”

🔄 Should SMEs Still Be Using SharePoint On-Prem?

The real issue here isn’t just one vulnerability, it’s the growing maintenance burden of keeping complex, locally hosted systems patched, monitored, and secure.


For smaller teams with limited IT resource, SharePoint can quickly become a liability, especially when:

  • Patch management is delayed

  • Antivirus isn’t integrated with the SharePoint server

  • Users sync local copies of sensitive files to devices

  • Access is shared externally via email links or guests


💡 Why VDI Might Be the Safer, Simpler Option

While SharePoint is a common collaboration tool, many businesses don’t realise they’re taking on unnecessary complexity and risk — especially when users access files from unmanaged devices.


VDI (Virtual Desktop Infrastructure), especially when delivered via a managed provider, creates a controlled, secure digital workspace where:

  • Users access files and apps through a secure desktop session

  • Nothing is stored locally on devices

  • All activity remains inside a centralised environment

  • Access controls and permissions are easier to enforce

  • Vulnerabilities in file-sharing systems (like SharePoint) are no longer a direct threat


🆚 SharePoint vs. VDI: A Quick Comparison

For SMEs dealing with sensitive data (law, finance, property, healthcare), VDI — where staff work in a controlled, secure hosted desktop — offers more protection:

Feature

SharePoint

VDI

File Access

Web-based, syncs to devices

Accessed within secure desktop

Security Risk

Exposed to external login vulnerabilities

Files and apps never leave server

Device Control

Depends on user machine security

Full control over session environment

User Experience

Familiar document management

Full Windows desktop or app portal

Ransomware Risk

High if synced locally

Minimal if properly isolated

Setup Complexity

Needs configuration, admin training

Managed VDI can be provisioned quickly

What Now?

If you're unsure which SharePoint version you’re using or whether AMSI is even enabled, speak to your IT provider immediately.


And if you’re still using on-premise file systems or hybrid storage models, now is the time to rethink it. VDI or secure cloud workspaces offer better:

  • Access control

  • Device isolation

  • Centralised management

  • Resilience to zero-day threats like CVE-2025-53770


The Bottom Line

SharePoint is widely used and can be powerful, but it’s only as secure as its configuration, patching, and user behaviour.


If your business deals with sensitive files, regulated industries, or remote work, moving to Microsoft 365 with cloud-native SharePoint or a secure VDI setup removes this entire class of risk especially when combined with backup, MFA, and endpoint security.


As threats like CVE-2025-53770 continue to surface, now might be the time to ask: Are you prioritising ease, or security?


If you'd like to evaluate your current setup or explore safer options, our team is here to help.

1 Comment


This newly discovered SharePoint security flaw serves as a serious reminder of why ongoing protection is essential. As a Microsoft Accredited Partner, Transparity is well-equipped to support UK businesses by auditing SharePoint environments, applying patches, and implementing enhanced access controls. A Trusted Microsoft Service Provider, Transparity delivers proactive monitoring and best‑practice cybersecurity alongside Microsoft 365 deployments. Don’t wait for a breach—stay ahead with comprehensive protection and user training. For businesses using SharePoint or Microsoft tools, their expertise ensures risks are minimized and productivity remains secure. Learn more about safeguarding your organization at transparity.com.

Like

Contact Us

Thanks for submitting!

Have a question you want answered quicker?

Give us a ring or try our online chat!

Tel. 02039064600

  • LinkedIn
  • Facebook
  • Instagram
  • Twitter

© 2025 SystemsCloud Group Ltd.

bottom of page