_research / sharepoint-spoofing-1300-servers-unpatched-ongoing-attacks
RESEARCH ANALYSIS 7 min read PREMIUM

1,300+ SharePoint Servers Left Bleeding: The Spoofing Vulnerability That Won't Die

Over 1,300 Microsoft SharePoint servers remain exposed to an actively exploited spoofing vulnerability. Here's what defenders need to know right now.

2026-04-22 · Source: Bleeping Computer
🔬
RESEARCH ANALYSIS

This analysis is based on research published by Bleeping Computer. CypherByte adds analysis, context, and security team recommendations.

Original research credit: Bleeping Computer. This analysis represents CypherByte's independent assessment and expanded technical commentary based on reported findings.

Executive Summary

More than 1,300 Microsoft SharePoint servers accessible from the public internet remain unpatched against a spoofing vulnerability that was first weaponized as a zero-day exploit — and threat actors are still actively abusing it today. This is not a historical footnote or a theoretical risk; this is a live, ongoing attack campaign targeting enterprise infrastructure that organizations depend on for document management, intranet portals, and business-critical collaboration workflows. If your organization operates SharePoint Server on-premises, or manages hybrid deployments, this analysis demands your immediate attention.

The persistence of this vulnerability across thousands of internet-facing systems represents a systemic failure in enterprise patch management — one that goes far beyond any single software flaw. Security teams, IT operations staff, and CISOs at organizations running SharePoint on-premises should treat this as an active incident indicator requiring urgent verification of patch status. The window for passive monitoring has closed. Attackers are inside that window right now.

Key Finding: Over 1,300 Microsoft SharePoint servers exposed to the public internet remain unpatched against an actively exploited spoofing vulnerability that was previously abused as a zero-day. Exploitation is confirmed to be ongoing.

Technical Analysis

The vulnerability in question is a spoofing flaw affecting Microsoft SharePoint Server — a class of vulnerability that, while sometimes underestimated in severity compared to remote code execution bugs, carries serious real-world consequences when weaponized in authenticated or semi-authenticated contexts. Spoofing vulnerabilities in collaboration platforms typically abuse weaknesses in how requests are validated, how authentication tokens are processed, or how server-side responses are constructed — allowing an attacker to masquerade as a trusted entity, forge requests, or manipulate how content is rendered and interpreted by downstream systems or users.

In the context of SharePoint, a spoofing attack surface is particularly dangerous because SharePoint acts as a trust anchor within many enterprise environments. It integrates with Active Directory, Azure AD, Microsoft 365, and a wide range of line-of-business applications. A successful spoofing attack can facilitate credential harvesting, NTLM relay attacks, and cross-site request forgery (CSRF) chains that pivot deeper into a network. Depending on how the spoofing is implemented by the attacker, it may also be used to poison cached content, redirect authenticated users to adversary-controlled infrastructure, or serve as the initial access vector that precedes more destructive follow-on activity.

The fact that this vulnerability was first observed as a zero-day — meaning it was actively exploited before a patch was publicly available — indicates that the threat actors who first discovered it had either sophisticated internal research capabilities or access to vulnerability intelligence markets. The transition from zero-day exploitation to continued post-patch exploitation against unpatched systems is a well-documented attacker lifecycle pattern. Once a patch is released, reverse engineering the fix often provides less sophisticated actors with enough technical detail to develop their own working exploits, dramatically broadening the attacker pool.

Attack Chain Consideration: SharePoint spoofing vulnerabilities frequently serve as enablers rather than endpoints. Defenders should assess not just whether the vulnerability was triggered, but what lateral movement or credential access activity may have followed an initial exploitation event.

Impact Assessment

Affected Systems: The exposure is specific to on-premises Microsoft SharePoint Server deployments that have not applied the relevant security updates. Organizations running SharePoint Online (Microsoft 365) are managed by Microsoft's update infrastructure and are not exposed to this specific server-side vulnerability in the same manner. The 1,300+ figure represents systems directly reachable from the public internet — a subset that inherently carries elevated risk due to direct attacker accessibility without requiring internal network positioning.

Real-World Consequences: The consequences of successful exploitation span a spectrum from reputational damage to full enterprise compromise. At the lower end, spoofed content or forged requests can undermine user trust and expose employees to phishing content served from a trusted internal domain — a highly effective social engineering vector. At the severe end, chained with additional vulnerabilities or misconfigurations, initial access through SharePoint spoofing can lead to domain credential exposure, NTLM hash capture, and ultimately full Active Directory compromise. Organizations in regulated industries — finance, healthcare, legal, government — face compounding consequences including compliance violations and mandatory breach notification obligations.

Perhaps most concerning is the demographic of organizations most likely to still be running unpatched on-premises SharePoint: mid-market enterprises and public sector entities with constrained IT resources, legacy integration dependencies that slow patching cycles, or change management processes that create dangerous lag between patch availability and deployment. These are not organizations with mature 24/7 SOC capabilities — they are precisely the organizations least equipped to detect and respond to active exploitation.

CypherByte's Perspective

While this vulnerability is rooted in server infrastructure rather than mobile endpoints, its implications extend directly into mobile security posture. Enterprise SharePoint deployments are increasingly accessed through mobile applications — Microsoft's own SharePoint mobile app, third-party document management clients, and custom enterprise apps built on SharePoint's APIs. A compromised or spoofed SharePoint environment becomes an adversary-controlled content delivery mechanism for every mobile device with a connected session. Mobile users who interact with SharePoint through apps lack the visual cues that might alert a desktop user to anomalous content — making mobile-facing SharePoint exposure a vector for silent credential theft and malicious document delivery.

This case also reinforces a broader principle that CypherByte has consistently emphasized: mobile security cannot be evaluated in isolation from the server-side infrastructure those devices trust. An organization may have best-in-class mobile device management, app vetting, and endpoint detection on every employee handset — and still be devastated by an attack that compromises the server infrastructure those devices rely on. Holistic security architecture requires treating the integrity of backend systems as a direct component of mobile threat modeling.

Indicators and Detection

Security teams should prioritize the following detection and investigation actions:

Patch Status Verification: Immediately audit all SharePoint Server deployments for the presence of relevant Microsoft security updates. Cross-reference your SharePoint version and patch level against Microsoft's Security Update Guide. Any system accessible from the internet without the patch applied should be treated as potentially compromised, not merely vulnerable.

Log Analysis Indicators: Review SharePoint Unified Logging Service (ULS) logs and IIS access logs for anomalous request patterns, including unusual HTTP referrer headers, unexpected POST requests to authentication endpoints, and requests originating from scanning infrastructure (cross-reference against known threat intelligence feeds). Look for evidence of NTLM authentication requests being relayed or unexpected outbound connections from SharePoint server hosts.

Network-Level Detection: Deploy or review IDS/IPS signatures targeting SharePoint exploitation patterns. Monitor for outbound connections from SharePoint hosts to non-standard external destinations — a potential indicator of NTLM relay or data exfiltration activity. Anomalous SMB traffic originating from SharePoint servers warrants immediate investigation.

Defender Priority: If your SharePoint server is internet-facing and you cannot confirm patch status within the next 24 hours, consider emergency network-level controls — including restricting public access — until patch status is verified.

Recommendations

1. Patch Immediately — No Exceptions: Apply all relevant Microsoft SharePoint security updates without delay. If change management processes are blocking emergency patching, escalate immediately. The cost of a patching maintenance window is categorically lower than the cost of incident response, breach notification, and recovery.

2. Restrict Internet Exposure: Evaluate whether your SharePoint deployment genuinely requires direct public internet accessibility. For many organizations, placing SharePoint behind a VPN, Zero Trust Network Access (ZTNA) gateway, or Web Application Firewall (WAF) with strict rule sets can dramatically reduce the attack surface without impacting legitimate user workflows — particularly in environments where mobile access is mediated through Microsoft's own managed app infrastructure.

3. Assume Breach, Investigate Accordingly: For any internet-facing SharePoint deployment that has been unpatched for a significant period, do not simply apply the patch and consider the matter closed. Conduct a retrospective log review covering at minimum the period since the vulnerability was first publicly disclosed. Engage your incident response capability to rule out prior compromise before restoring normal operations.

4. Harden Authentication Pathways: Implement or verify multi-factor authentication (MFA) across all SharePoint access pathways. Review NTLM usage in your environment and move toward Kerberos or modern token-based authentication wherever possible to reduce the utility of credential-based follow-on attacks.

5. Establish Continuous Exposure Monitoring: Use external attack surface management tools to maintain ongoing visibility into which of your assets are internet-facing and what their patch posture is. The 1,300 vulnerable servers identified in this research represent organizations that either did not know they were exposed or knew and failed to act. Neither outcome is acceptable. Continuous monitoring transforms patch management from a reactive fire drill into a proactive risk discipline.

Source: Bleeping Computer, "Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks." CypherByte conducts independent analysis of reported security research for informational and defensive purposes.

// TOPICS
#research#analysis
// WANT MORE LIKE THIS?

Get full access to all research analyses, deep-dive writeups, and premium threat intelligence.