Back to Hub

Chinese Hackers Exploit Unpatched SharePoint Zero-Day in Global Cyberattack

Imagen generada por IA para: Hackers chinos explotan zero-day sin parchear en SharePoint en ataque global

A critical vulnerability in Microsoft SharePoint, initially patched in June 2023, is being actively exploited by Chinese state-sponsored hacking groups in a global cyberattack campaign. Security researchers have confirmed that the patch for CVE-2023-29357, a privilege escalation flaw, can be bypassed, effectively leaving thousands of organizations vulnerable to complete system compromise.

The vulnerability allows attackers to gain administrator privileges on affected SharePoint servers by exploiting flaws in the authentication mechanism. Once elevated privileges are obtained, threat actors can deploy web shells, exfiltrate sensitive data, and move laterally through enterprise networks.

Microsoft had originally rated this as an important (not critical) vulnerability when first addressed in June's Patch Tuesday updates. However, the incomplete fix has now elevated this to a critical threat, with multiple advanced persistent threat (APT) groups weaponizing the exploit chain.

'This represents a fundamental failure in Microsoft's secure development lifecycle,' noted a senior researcher at a prominent cybersecurity firm. 'When patches can be bypassed months after release, it erodes trust in the entire security update ecosystem.'

Technical analysis reveals that the bypass technique involves manipulating certain SharePoint API calls that weren't properly secured in the initial patch. Attackers are combining this with other known vulnerabilities to create reliable exploit chains that work against supposedly patched systems.

Organizations are advised to:

  1. Implement the temporary mitigations provided by Microsoft
  2. Monitor for suspicious .aspx files in SharePoint directories
  3. Restrict external access to SharePoint administration interfaces
  4. Apply additional network segmentation for SharePoint servers

The incident comes as Microsoft faces increasing criticism over its security practices following multiple high-profile breaches linked to nation-state actors. Security professionals are calling for more rigorous patch verification processes and transparent communication about patch effectiveness.

Original source: View Original Sources
NewsSearcher AI-powered news aggregation

Comentarios 0

¡Únete a la conversación!

Sé el primero en compartir tu opinión sobre este artículo.