The Cybersecurity and Infrastructure Security Agency (CISA) released an updated alert to reflect newly released information from Microsoft, and to correct the actively exploited Common Vulnerabilities and Exposures (CVEs), which have been confirmed as  CVE-2025-49706 , a network spoofing vulnerability, and CVE-2025-49704, a remote code execution (RCE) vulnerability.

CISA is aware of active exploitation of a spoofing and RCE vulnerability chain involving CVE-2025-49706 and CVE-2025-49704, enabling unauthorized access to on-premise SharePoint servers. While the scope and impact continue to be assessed, the chain, publicly reported as ToolShell, provides unauthenticated access to systems and authenticated access through network spoofing, respectively, and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network.

While not actively exploited, Microsoft has identified the following new CVEs that pose a potential risk:

What You Should Do

If you have questions or need assistance, contact a member of the Admiral team.

 

Get a Free Consultation

Fill out the form below to get a free consultation and find out how we can make your technology hassle-free!

This field is for validation purposes and should be left unchanged.

Contact Information