← Blog

Now SharePoint CVE-2026-20963 is unauthenticated — the attack surface just went from stolen creds to anyone with a URL.

Threat intelligence brief · SOC

Context: Microsoft Q&A — CVE-2026-20963 · MSRC

A critical SharePoint remote code execution (RCE) via insecure deserialization is actively exploited. What changed the game: exploitation is now unauthenticated — the bar moved from stolen creds to anyone who can hit the URL. Unpatched, internet-exposed farms are in the scanning pool.

This is not a paper CVE. It’s operational: no phished account required if the chain is reachable anonymously. Increased scanning against SharePoint endpoints is public; treat exposure as time-to-compromise, not a risk register line item.

Why it matters now

Technical breakdown (sharp)

Root cause: Insecure deserialization (CWE-502) in SharePoint’s handling of attacker-controlled serialized data.

Attack flow:

Impact:

Attack playbook (realistic)

1. Attacker finds internet-exposed SharePoint (or partner/VPN path with weak controls).

2. No account needed — sends requests to the unauthenticated vulnerable code path (or chains that bypass prior auth assumptions).

3. Delivers malicious serialized content in the crafted request.

4. Achieves RCE on the worker → webshell or in-memory implant.

5. Harvests machine keys, connection strings, service accounts, and SharePoint secrets from disk or memory.

6. Pivots internally — AD, SQL, file shares, email — using trusted farm identity.

That sequence is standard post-2015 enterprise tradecraft. The only variable is whether you patched.

Detection & indicators

Mitigation (non-negotiable)

In 2026, exposure is exploitation. If your SharePoint is exposed, you’re already in the scanning pool. Patch, verify, hunt — in that order.