July 24, 2025 4m read

Cato CTRL™ Threat Brief: “ToolShell” Exploit Targeting Microsoft SharePoint Vulnerabilities 

Dr. Guy Waizel
Roei Kriger
Dr. Guy Waizel , Roei Kriger

Table of Contents

Wondering where to begin your SASE journey?

We've got you covered!
Listen to post:
Getting your Trinity Audio player ready...

Executive Summary 

On July 22, 2025, Microsoft published an overview of a series of critical vulnerabilities affecting Microsoft SharePoint Server (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771). These vulnerabilities opened a dangerous window for threat actors to gain access to internal resources, execute code remotely, and take over SharePoint deployments. According to Microsoft, it has “observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting these vulnerabilities targeting internet-facing SharePoint servers.” 

With the SharePoint vulnerabilities, Cato delivers the following protections to customers:  

  • Any exploitation attempts trigger an event and generate an XDR story in Cato XDR. 

While IT teams race to implement updates and minimize potential impact, Cato customers benefit from near-immediate threat coverage from the SharePoint vulnerabilities. 

Technical Overview 

The SharePoint vulnerabilities being actively exploited trace back to a multi-stage exploit chain targeting on-premises deployments. 

Timeline:  

  • May 16, 2025: At Pwn2Own Berlin 2025, Viettel Cyber Security demonstrated a chained attack combining CVE-2025-49704 (remote code execution vulnerability) and CVE-2025-49706 (network spoofing vulnerability). Together, these flaws enabled RCE and laid the foundation for what would become a widely exploited technique. 
  • July 9, 2025: Microsoft released initial patches for both CVEs as part of their Patch Tuesday rollout, aiming to block the original exploit chain. 
  • July 14, 2025: Cybersecurity firm CODE WHITE reproduced the exploit, which they referred to as “ToolShell,” validating that the chain could still be leveraged. ToolShell refers to SharePoint’s /ToolPane.aspx (CVE-2025-49704).  
  • July 18, 2025: The first confirmed in-the-wild attacks were identified by Eye Security. Threat actors had developed bypass variants that sidestepped the July 9 patches and began exploiting vulnerable SharePoint servers.   
  • July 19, 2025: A second wave of attacks occurred, according to Eye Security.  
  • July 19, 2025: Microsoft issued an advisory summarizing two additional CVEs for the modified exploit path: CVE-2025-53770 (patch bypass for CVE-2025-49704) and CVE-2025-53771 (patch bypass for CVE-2025-49706).  
  • July 21, 2025: Microsoft released emergency security updates for SharePoint Server Subscription Edition and SharePoint Server 2019 to fully mitigate the updated attack chain. 

The Threat Landscape: ToolShell in Action 

ToolShell is a chained exploit targeting Microsoft SharePoint Server, first disclosed in May 2025. It enables unauthenticated RCE by combining multiple server-side flaws, without requiring credentials or user interaction. The attack begins by bypassing authentication through CVE-2025-53771, where manipulated HTTP headers make malicious requests appear legitimate. This allows threat actors to exploit CVE-2025-53770 and deploy a web shell for persistent access. Once established, the web shell is used to extract cryptographic keys from the server. With these keys, threat actors can create signed payloads that SharePoint accepts as trusted, enabling continued and stealthy code execution even after the original vulnerabilities are patched. The result is a highly effective and difficult-to-detect attack chain. 

Conclusion 

This rapid evolution from proof-of-concept (PoC) to active exploitation for the Microsoft SharePoint vulnerabilities underscores how quickly threat actors can pivot and adapt, even after patches are issued. 

The frequency of high-severity CVEs continues to rise. With active attacks already in progress, relying solely on a reactive security approach is no longer sufficient.  

2025 Cato CTRL™ Threat Report | Download the report

Protections 

The Cato SASE Cloud Platform offers a significant advantage in defending against rapidly evolving threats. Unlike traditional perimeter-based security, which depends on patching and policy updates at each site or server, Cato delivers global protection through a single-pass cloud engine (SPACE). SPACE is the core security engine of Cato. Whether you operate from a single location or manage multiple on-premises SharePoint servers across regions, the Cato SASE Cloud Platform ensures your entire organization is protected immediately without the need to modify local infrastructure. 

With the SharePoint vulnerabilities, Cato delivers the following protections to customers:  

  • Any exploitation attempts trigger an event and generate an XDR story in Cato XDR.  

This proactive approach ensures consistent protection across all customer environments, reducing the risk posed by unpatched systems or exposure from remote and unmanaged sites. Cato automatically blocks exploitation attempts by inspecting and enforcing policies across all traffic in real time. 

We are actively monitoring developments related to the SharePoint vulnerabilities and any emerging threats. Our customers can trust that they are protected today and prepared for the vulnerabilities of tomorrow. 

Related Topics

Wondering where to begin your SASE journey?

We've got you covered!
Dr. Guy Waizel

Dr. Guy Waizel

Tech Evangelist

Dr. Guy Waizel is a Tech Evangelist at Cato Networks and a member of Cato CTRL. As part of his role, Guy collaborates closely with Cato's researchers, developers, and tech teams to bridge and evangelize tech by researching, writing, presenting, and sharing key insights, innovations, and solutions with the broader tech and cybersecurity community. Prior to joining Cato in 2025, Guy led and evangelized security efforts at Commvault, advising CISOs and CIOs on the company’s entire security portfolio. Guy also worked at TrapX Security (acquired by Commvault) in various hands-on and leadership roles, including support, incident response, forensic investigations, and product development. Guy has more than 25 years of experience spanning across cybersecurity, IT, and AI, and has held key roles at tech startups acquired by Philips, Stanley Healthcare, and Verint. Guy holds a PhD with magna cum laude honors from Alexandru Ioan Cuza University, his research thesis focused on the intersection of marketing strategies, cloud adoption, cybersecurity, and AI; an MBA from Netanya Academic College; a B.Sc. in technology management from Holon Institute of Technology; and multiple cybersecurity certifications.

Read More
Roei Kriger

Roei Kriger

Security Engineer

Roei Kriger is a security engineer at Cato Networks and member of Cato CTRL. He analyzes, researches, and develops protections against emerging threats and CVEs. Roei brings more than 3 years of experience in cybersecurity threat protection. Prior to joining Cato in 2023, Roei worked at IBM Trusteer as a cyber software developer. Roei holds a Bachelor of Science in Information Systems from Haifa University.

Read More