By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

When SharePoint Betrays You: Detecting and Blocking the ToolShell Zero-Day (CVE-2025-53770)

Astro Information Security
When SharePoint Betrays You: Detecting and Blocking the ToolShell Zero-Day (CVE-2025-53770)
Table of Content:

[fs-toc-h2]Introduction

Recent weeks have brought alarming news of a critical zero-day vulnerability, dubbed ToolShell (CVE-2025-53770), impacting Microsoft SharePoint Server. Attackers exploiting this flaw can execute remote code without authentication, gaining full administrative access to affected servers. With a severity rating of 9.8 out of 10, organizations globally, including high-profile government entities, are urgently scrambling to address the risks posed by this dangerous security gap.

[fs-toc-h2]Understanding the Vulnerability

ToolShell involves chaining vulnerabilities—a spoofing flaw (CVE-2025-53771) combined with a deserialization issue (CVE-2025-53770)—allowing threat actors to bypass authentication protections. Attackers utilize specially crafted HTTP POST requests to compromise SharePoint endpoints, ultimately deploying persistent web shells capable of stealing sensitive cryptographic keys and achieving ongoing remote code execution.

[fs-toc-h2]Real-World Impact

Prominent hacker groups have already exploited this vulnerability, deploying ransomware and conducting espionage against critical infrastructure. Notable victims include entities in healthcare, finance, education, and even the U.S. National Nuclear Security Administration. The ongoing nature of these breaches emphasizes the critical urgency for immediate remediation.

[fs-toc-h2]Detecting ToolShell Exploitation

At Astro, we utilize advanced detection queries to identify exploitation patterns:

DeviceFileEvents
| where FolderPath has_any (@'microsoft shared\Web Server Extensions\16\TEMPLATE\LAYOUTS', @'microsoft shared\Web Server Extensions\15\TEMPLATE\LAYOUTS')
| where FileName has "spinstall0"
| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine, FileName, FolderPath, ReportId, ActionType, SHA256
| order by Timestamp desc

DeviceProcessEvents
| where InitiatingProcessFileName has "w3wp.exe"
 and InitiatingProcessCommandLine !has "DefaultAppPool"
 and FileName =~ "cmd.exe"
 and ProcessCommandLine has_all ("cmd.exe", "powershell")
 and ProcessCommandLine has_any ("EncodedCommand", "-ec")
| extend CommandArguments = split(ProcessCommandLine, " ")
| mv-expand CommandArguments to typeof(string)
| where CommandArguments matches regex "^[A-Za-z0-9+/=]{15,}$"
| extend B64Decode = replace("\\x00", "", base64_decodestring(tostring(CommandArguments)))  
| where B64Decode has_any ("spinstall0", @'C:\PROGRA~1\COMMON~1\MICROS~1\WEBSER~1\15\TEMPLATE\LAYOUTS', @'C:\PROGRA~1\COMMON~1\MICROS~1\WEBSER~1\16\TEMPLATE\LAYOUTS')

Our platform further enriches this detection with user-behavior analytics, significantly enhancing your response capability.

[fs-toc-h2]Steps for Immediate Remediation

  • Apply emergency patches issued by Microsoft immediately.
  • Rotate your ASP.NET machine keys to prevent ongoing exploitation.
  • Enable AMSI and Defender AV to detect and block exploitation attempts proactively.
  • Disconnect vulnerable SharePoint servers from the internet until secured.
  • Deploy endpoint monitoring tools to detect suspicious file creation and lateral movement attempts swiftly.

{{post-cta}}

[fs-toc-h2]How Astro Protects Your Organization

Our proactive threat detection and incident response platform provides:

  • Immediate alerts and actionable intelligence on exploitation attempts.
  • Automation for rapid machine key rotations and threat containment.
  • Comprehensive response guidance from our expert incident response team.

[fs-toc-h2]Secure Your SharePoint Now

Don’t wait to become another headline. Contact us today for a comprehensive SharePoint security assessment or demo our detection capabilities to proactively defend your digital assets.

Frequently asked questions
No items found.
Share this Article:
contact us

Get started on your security today

Let us know how we can help you stay on track with your cybersecurity. We’ll get back to you in 24 hours or sooner.

contact us

Get started on your security today

Let us know how we can help you stay on track with your cybersecurity. We’ll get back to you in 24 hours or sooner.