<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Set-SPMachineKey Archives - MachSol Blog</title>
	<atom:link href="https://blog.machsol.com/tag/set-spmachinekey/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.machsol.com/tag/set-spmachinekey</link>
	<description>Multi-Cloud Service Orchestration &#38; Delivery Platform</description>
	<lastBuildDate>Thu, 31 Jul 2025 06:52:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Critical SharePoint Zero-Day Exploit Targeting Enterprises</title>
		<link>https://blog.machsol.com/microsoft-sharepoint/critical-sharepoint-zero-day-exploit-cve-2025-53770-machsol-blog</link>
		
		<dc:creator><![CDATA[Jameel]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 15:48:01 +0000</pubDate>
				<category><![CDATA[Announcements]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Hosting & SaaS]]></category>
		<category><![CDATA[Microsoft SharePoint]]></category>
		<category><![CDATA[CVE-2025-53770]]></category>
		<category><![CDATA[CVE-2025-53771]]></category>
		<category><![CDATA[How to Safeguard Your SharePoint Environment]]></category>
		<category><![CDATA[Set-SPMachineKey]]></category>
		<category><![CDATA[SharePoint 2016]]></category>
		<category><![CDATA[SharePoint 2019]]></category>
		<category><![CDATA[SharePoint Subscription Edition (SE)]]></category>
		<category><![CDATA[Update-SPMachineKey]]></category>
		<guid isPermaLink="false">https://blog.machsol.com/?p=5804</guid>

					<description><![CDATA[<p>A critical zero-day vulnerability in Microsoft SharePoint Server, CVE-2025-53770, is being actively exploited in targeted attacks against enterprises and government systems. The exploit allows unauthenticated remote code execution (RCE), key theft, and persistent backdoor installation. Organizations running on-premises SharePoint (Subscription Edition, 2019, and 2016) face immediate operational, legal, and reputational risk if unpatched or misconfigured. [&#8230;]</p>
<p>The post <a href="https://blog.machsol.com/microsoft-sharepoint/critical-sharepoint-zero-day-exploit-cve-2025-53770-machsol-blog">Critical SharePoint Zero-Day Exploit Targeting Enterprises</a> appeared first on <a href="https://blog.machsol.com">MachSol Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="404" data-end="699">A <strong data-start="406" data-end="472">critical zero-day vulnerability in Microsoft SharePoint Server</strong>, CVE-2025-53770, is being actively exploited in targeted attacks against enterprises and government systems. The exploit allows <strong data-start="601" data-end="648">unauthenticated remote code execution (RCE)</strong>, key theft, and persistent backdoor installation.</p>
<p><img fetchpriority="high" decoding="async" class="size-full wp-image-5827 aligncenter" src="https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now.jpg" alt="" width="1000" height="400" srcset="https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now.jpg 1000w, https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now-350x140.jpg 350w, https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now-768x307.jpg 768w, https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now-720x288.jpg 720w, https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now-580x232.jpg 580w, https://blog.machsol.com/wp-content/uploads/safeguard-sharepoint-Now-320x128.jpg 320w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p data-start="701" data-end="880">Organizations running <strong data-start="723" data-end="788">on-premises SharePoint (Subscription Edition, 2019, and 2016)</strong> face immediate operational, legal, and reputational risk if unpatched or misconfigured.</p>
<h2 data-start="887" data-end="911"><span style="font-size: 14pt; color: #3366ff;">Technical Overview</span></h2>
<ul>
<li><strong data-start="915" data-end="926">CVE IDs</strong>: CVE-2025-53770 (primary RCE), CVE-2025-53771 (chained)</li>
<li><strong data-start="985" data-end="1008">Vulnerability Class</strong>: .NET ViewState Deserialization + Path Traversal</li>
<li data-start="1060" data-end="1083"><strong data-start="1060" data-end="1082">Affected Platforms</strong>:
<ul>
<li data-start="1088" data-end="1130">SharePoint Server <strong data-start="1106" data-end="1130">Subscription Edition</strong></li>
<li data-start="1135" data-end="1161">SharePoint Server <strong data-start="1153" data-end="1161">2019</strong></li>
<li data-start="1166" data-end="1237">SharePoint Server <strong data-start="1184" data-end="1192"><strong data-start="1184" data-end="1192">2016</strong></strong></li>
</ul>
</li>
<li data-start="1240" data-end="1413"><strong data-start="1240" data-end="1257">Attack Vector</strong>: Unauthenticated HTTP(S) request to <code data-start="1294" data-end="1309">ToolPane.aspx</code> leveraging insecure ViewState + malicious path traversal to drop arbitrary code in server-side layouts.</li>
<li><strong data-start="1416" data-end="1427">Payload</strong>: <code data-start="1429" data-end="1446">spinstall0.aspx</code> web shell deployed for persistent control and exfiltration.</li>
</ul>
<h2 data-start="1508" data-end="1538"><span style="font-size: 14pt; color: #3366ff;">Technical Implications:</span></h2>
<ul>
<li data-start="1541" data-end="1639"><strong data-start="1541" data-end="1567">Machine key compromise</strong>: Allows attackers to sign payloads that bypass authentication controls.</li>
<li data-start="1642" data-end="1719"><strong data-start="1642" data-end="1667">Web shell persistence</strong>: Enables long-term command and control (C2) access.</li>
<li data-start="1722" data-end="1817"><strong data-start="1722" data-end="1760">Post-exploitation lateral movement</strong>: Via NTLM relay, LDAP harvesting, or credential dumping.</li>
<li data-start="1820" data-end="1920"><strong data-start="1820" data-end="1844">Detection challenges</strong>: Use of legitimate pages (<code data-start="1871" data-end="1886">ToolPane.aspx</code>) and tampering with AMSI logging</li>
</ul>
<h3 data-start="991" data-end="1032"></h3>
<p data-start="991" data-end="1032"><strong><span style="color: #3366ff; font-size: 14pt;"> Immediate Remediation Guide</span></strong></p>
<p data-start="991" data-end="1032"><strong>1. Patch All Versions Immediately</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li data-start="1035" data-end="1074"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><strong data-start="0" data-end="24" data-is-only-node="">Subscription Edition</strong> → <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108285" target="_blank" rel="noopener">KB 5002768</a></span></li>
<li data-start="1077" data-end="1116"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><strong data-start="0" data-end="19" data-is-only-node="">SharePoint 2019</strong> → <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108286" target="_blank" rel="noopener">KB 5002754 </a> AND  <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108287" target="_blank" rel="noopener">KB 5002753 </a></span></li>
<li><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><strong data-start="0" data-end="19" data-is-only-node="">SharePoint 2016</strong> →  <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108288" target="_blank" rel="noopener">KB 5002760</a> (language pack), <a href="https://www.microsoft.com/en-us/download/details.aspx?id=108289" target="_blank" rel="noopener">KB 5002759</a> (core)</span></span></span></span></span></li>
</ul>
</li>
</ul>
<p><strong>2. Rotate SharePoint Server ASP.NET machine keys</strong></p>
<p style="padding-left: 40px;">After applying the latest security updates above, it is critical that to rotate SharePoint server ASP.NET machine keys and restart IIS on all SharePoint servers.</p>
<p style="padding-left: 40px;">To update the machine keys for a web application using <strong>PowerShell</strong>:</p>
<ul>
<li>Generate the machine key in PowerShell using<strong> Set-SPMachineKey</strong><br />
<img decoding="async" class="alignnone size-full wp-image-5811" src="https://blog.machsol.com/wp-content/uploads/set-spmachinekey.png" alt="" width="836" height="53" srcset="https://blog.machsol.com/wp-content/uploads/set-spmachinekey.png 836w, https://blog.machsol.com/wp-content/uploads/set-spmachinekey-350x22.png 350w, https://blog.machsol.com/wp-content/uploads/set-spmachinekey-768x49.png 768w, https://blog.machsol.com/wp-content/uploads/set-spmachinekey-720x46.png 720w, https://blog.machsol.com/wp-content/uploads/set-spmachinekey-580x37.png 580w, https://blog.machsol.com/wp-content/uploads/set-spmachinekey-320x20.png 320w" sizes="(max-width: 836px) 100vw, 836px" /></li>
<li>Deploy the machine key to the farm in PowerShell using <strong>Update-SPMachineKey</strong><br />
<img decoding="async" class="alignnone size-full wp-image-5812" src="https://blog.machsol.com/wp-content/uploads/update-spmachinekey.png" alt="" width="842" height="52" srcset="https://blog.machsol.com/wp-content/uploads/update-spmachinekey.png 842w, https://blog.machsol.com/wp-content/uploads/update-spmachinekey-350x22.png 350w, https://blog.machsol.com/wp-content/uploads/update-spmachinekey-768x47.png 768w, https://blog.machsol.com/wp-content/uploads/update-spmachinekey-720x44.png 720w, https://blog.machsol.com/wp-content/uploads/update-spmachinekey-580x36.png 580w, https://blog.machsol.com/wp-content/uploads/update-spmachinekey-320x20.png 320w" sizes="(max-width: 842px) 100vw, 842px" /></li>
</ul>
<p><strong>3. IIS &#8220;<code data-start="98" data-end="108">iisreset</code>&#8221; reset after the rotation has completed.</strong></p>
<p style="padding-left: 40px;"><code data-start="0" data-end="10" data-is-only-node="">iisreset</code> is required to ensure all SharePoint services<strong> immediately load the new machine</strong> keys from <code data-start="100" data-end="112">web.config</code> and prevent use of old keys left in memory.</p>
<p>&nbsp;</p>
<h3 data-start="517" data-end="558"><span style="color: #3366ff; font-size: 12pt;">Why <strong data-start="527" data-end="550">Machine Key Rotation</strong> matters</span></h3>
<ul>
<li data-start="562" data-end="642"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><strong data-start="0" data-end="32" data-is-only-node="">Patching alone is not enough</strong>:  Attackers who have already stolen validation/decryption keys can continue creating malicious ViewState payloads.</span></li>
<li data-start="645" data-end="725"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><strong data-start="0" data-end="34" data-is-only-node="">Microsoft guidance: </strong>The Microsoft Defender Vulnerability Management blog recommends rotating the machineKey twice, once before and once after applying patches to ensure complete protection.</span></li>
<li data-start="645" data-end="725"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><span class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out"><strong data-start="0" data-end="19" data-is-only-node="">Double rotation:</strong> This practice helps eliminate lingering threats and prevents attackers from exploiting stolen cryptographic material.</span></span></li>
</ul>
<p data-start="1417" data-end="1427"><strong><span style="font-size: 14pt; color: #3366ff;">Summary</span></strong></p>
<ul>
<li data-start="1431" data-end="1537"><strong data-start="1431" data-end="1454">Exploit in-the-wild</strong>: The ToolShell exploit (CVE-2025-53770) is actively targeting on-premises SharePoint servers.</li>
<li data-start="1431" data-end="1537"><strong data-start="1540" data-end="1559">Patches ongoing</strong>: Subscription Edition, 2019 and 2016 have patches available</li>
<li data-start="1431" data-end="1537"><strong data-start="1622" data-end="1657">MachineKey rotation is critical</strong>: Machine key rotation is essential to invalidate stolen keys and stop persistent threats.</li>
<li><strong>Post Rotation:</strong> Always restart IIS on all SharePoint servers using <code data-start="3638" data-end="3652">iisreset.exe</code> to apply changes immediately.</li>
</ul>
<p>For comprehensive information, please refer to Microsoft&#8217;s official Common Vulnerabilities and Exposures (CVE) documentation for CVE-2025-53770 and related vulnerabilities</p>
<p><span style="font-size: 9pt;"><strong data-start="68" data-end="83">Disclaimer:</strong> Always back up your configuration (web.config and other) and test changes in a non-production environment before applying them to live systems.</span></p>
<p data-start="3689" data-end="3749"><span style="color: #3366ff;"><span style="font-size: 14pt; color: #3366ff;">→ </span><strong><span style="font-size: 14pt; color: #3366ff;">Securing SharePoint Against Current and Future Threats</span><span style="font-size: 14pt;"><br />
</span></strong><em><strong><span style="font-size: 14pt;"><img loading="lazy" decoding="async" class="size-full wp-image-5842 aligncenter" src="https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1.jpg" alt="" width="1000" height="400" srcset="https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1.jpg 1000w, https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1-350x140.jpg 350w, https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1-768x307.jpg 768w, https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1-720x288.jpg 720w, https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1-580x232.jpg 580w, https://blog.machsol.com/wp-content/uploads/Secure-SharePoint-1-320x128.jpg 320w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></span></strong></em></span></p>
<p data-start="3751" data-end="3818">To protect your SharePoint deployment from this and future threats:</p>
<ul>
<li><strong data-start="328" data-end="359">Maintain Up-to-Date Systems</strong>: Ensure all SharePoint servers and related infrastructure are fully patched with the latest Microsoft security updates.</li>
<li><strong data-start="565" data-end="604">Rotate Cryptographic Keys Regularly</strong>: Periodically rotate machine keys, especially following security incidents to reduce the risk of key compromise.</li>
<li data-start="4100" data-end="4226"><strong data-start="760" data-end="810">Implement Comprehensive Logging and Monitoring</strong>: Enable detailed logging for SharePoint, including Antimalware Scan Interface (AMSI) and Windows Event Logs. Monitor for signs of tampering, suspicious activity.</li>
<li data-start="4229" data-end="4358"><strong data-start="147" data-end="185">Apply Network and Access Controls: </strong>Restrict access to SharePoint administrative interfaces, especially the <strong data-start="259" data-end="290">Central Administration site</strong> and other configuration pages by implementing network segmentation, VPNs, and firewall rules. Ensure that only authorized personnel can reach these sensitive areas by limiting access to trusted networks or through secure remote access solutions.</li>
<li data-start="4361" data-end="4477"><strong data-start="1277" data-end="1311">Backup and Test Configurations</strong>: Regularly back up key configuration files (e.g., <code data-start="1362" data-end="1374">web.config</code>, <code data-start="1376" data-end="1392">machine.config</code>) and test patches and updates in a controlled staging environment prior to production deployment.</li>
</ul>
<p><span style="font-size: 10pt;"> </span></p>
<p>The post <a href="https://blog.machsol.com/microsoft-sharepoint/critical-sharepoint-zero-day-exploit-cve-2025-53770-machsol-blog">Critical SharePoint Zero-Day Exploit Targeting Enterprises</a> appeared first on <a href="https://blog.machsol.com">MachSol Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
