A confirmed SharePoint exploit chain is under active attack β€” learn how to patch, protect, and respond.


πŸ›‘οΈ What Is the SharePoint ToolShell Exploit?

In July 2025, Microsoft and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed active exploitation of a critical vulnerability chain now known as ToolShell. This chain affects on-premises SharePoint Servers (not Microsoft 365/SharePoint Online).

The vulnerability combination includes:

CVETypeRisk
CVE-2025-49704Remote Code Execution (RCE)Full unauthenticated execution
CVE-2025-49706Network SpoofingAuthenticated access bypass
CVE-2025-53770Patch Bypass for 49704Restores vulnerability post-patch
CVE-2025-53771Patch Bypass for 49706Compromises authentication layers

πŸ“Œ Affected Systems:


⚠️ Why It Matters

This exploit chain gives attackers the ability to:

Attackers have been observed:

This has been confirmed by:


βœ… What to Do Right Now (Step-by-Step)

  1. Apply Microsoft’s Security Patches (released July 8, 2025)
    • KB5002768 (SE), KB5002754 (2019), KB5002760 (2016)
  2. Rotate ASP.NET Machine Keys
    • Do this before and after patching
  3. Restart IIS
    • Use iisreset to ensure clean restart
  4. Enable AMSI (Antimalware Scan Interface)
    • Configure via PowerShell and deploy Microsoft Defender Antivirus
  5. Scan logs for attack signatures
    • Review access logs for suspicious ToolPane or SignOut activity
  6. Audit for compromise
    • Look for unknown .aspx, .dll, or .exe files in SharePoint paths
  7. Block attacker IPs in your firewall
    • Especially those active July 18–20, 2025
  8. Disconnect unsupported servers
    • SharePoint 2013 and earlier must be taken offline immediately

πŸ†˜ Emergency Response Offer from Technov8

In response to this critical situation, Technov8 is offering support for organizations impacted by ToolShell:

Available Services:

For deeper support, Technov8 also offers:


πŸ“¬ Contact Technov8 for Immediate Help


🧠 FAQ: SharePoint ToolShell (CVE-2025-49704/49706)

Q: Is SharePoint Online affected?
No. Only on-prem SharePoint servers are impacted.

Q: I already patched β€” am I safe?
Maybe. The patch bypasses (CVE-2025-53770/53771) mean you must verify patch levels and still rotate keys.

Q: I’m using SharePoint 2013 β€” should I worry?
Yes. It’s unsupported and vulnerable. Disconnect it now.

Q: What if I find signs of compromise?
Contact us immediately. Do not delay incident response.


🧷 Resources