Skip to content

Commit 44959f8

Browse files
kodster28sdnts
authored andcommitted
[Changelog] Emergency WAF (cloudflare#23870)
1 parent 23edca6 commit 44959f8

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: "2025-07-21 - Emergency"
3+
description: This week's update highlights several high-impact vulnerabilities affecting Microsoft SharePoint Server.
4+
date: 2025-07-21
5+
---
6+
7+
import { RuleID } from "~/components";
8+
9+
This week's update highlights several high-impact vulnerabilities affecting Microsoft SharePoint Server. These flaws, involving unsafe deserialization, allow unauthenticated remote code execution over the network, posing a critical threat to enterprise environments relying on SharePoint for collaboration and document management.
10+
11+
**Key Findings**
12+
13+
- Microsoft SharePoint Server (CVE-2025-53770): A critical vulnerability involving unsafe deserialization of untrusted data, enabling unauthenticated remote code execution over the network. This flaw allows attackers to execute arbitrary code on vulnerable SharePoint servers without user interaction.
14+
- Microsoft SharePoint Server (CVE-2025-53771): A closely related deserialization issue that can be exploited by unauthenticated attackers, potentially leading to full system compromise. The vulnerability highlights continued risks around insecure serialization logic in enterprise collaboration platforms.
15+
16+
**Impact**
17+
18+
Together, these vulnerabilities significantly weaken the security posture of on-premise Microsoft SharePoint Server deployments. By enabling remote code execution without authentication, they open the door for attackers to gain persistent access, deploy malware, and move laterally across enterprise environments.
19+
20+
<table style="width: 100%">
21+
<thead>
22+
<tr>
23+
<th>Ruleset</th>
24+
<th>Rule ID</th>
25+
<th>Legacy Rule ID</th>
26+
<th>Description</th>
27+
<th>Previous Action</th>
28+
<th>New Action</th>
29+
<th>Comments</th>
30+
</tr>
31+
</thead>
32+
<tbody>
33+
<tr>
34+
<td>Cloudflare Managed Ruleset</td>
35+
<td>
36+
<RuleID id="34dac2b38b904163bc587cc32168f6f0" />
37+
</td>
38+
<td>100817</td>
39+
<td>Microsoft SharePoint - Deserialization - CVE:CVE-2025-53770</td>
40+
<td>N/A</td>
41+
<td>Block</td>
42+
<td>This is a New Detection</td>
43+
</tr>
44+
<tr>
45+
<td>Cloudflare Managed Ruleset</td>
46+
<td>
47+
<RuleID id="d21f327516a145bc9d1b05678de656c4" />
48+
</td>
49+
<td>100818</td>
50+
<td>Microsoft SharePoint - Deserialization - CVE:CVE-2025-53771</td>
51+
<td>N/A</td>
52+
<td>Block</td>
53+
<td>This is a New Detection</td>
54+
</tr>
55+
</tbody>
56+
</table>

0 commit comments

Comments
 (0)