The attack campaign, dubbed “ToolShell,” leverages a vulnerability chain involving CVE-2025-49706 (network spoofing) and CVE-2025-49704 (remote code execution) to gain unauthorized access to on-premises SharePoint servers. Additionally, organizations must scan for connections from three specific IP addresses: 107.191.58[.]76, 104.238.159[.]149, and 96.9.125[.]147, particularly focusing on activity between July 18-19, 2025. Organizations operating end-of-life SharePoint versions, such as SharePoint Server 2013, should immediately disconnect these systems from internet-facing networks. Security researchers from Eye Security and Palo Alto Networks Unit42 have provided detailed analysis of the exploitation methods being employed. Apply patches immediately, configure AMSI, and disconnect end-of-life SharePoint systems. The company has also identified two additional patch bypass vulnerabilities: CVE-2025-53771 and CVE-2025-53770, which could potentially circumvent the initial fixes for the primary vulnerabilities. Critical mitigation steps include rotating ASP.NET machine keys both before and after applying patches, then restarting IIS web servers to ensure complete protection.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 23 Jul 2025 10:45:06 +0000