Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Home/CyberSecurity News/CISA Warns: Microsoft SharePoint Vulnerability Actively
CyberSecurity News

CISA Warns: Microsoft SharePoint Vulnerability Actively

A critical security flaw impacting Microsoft SharePoint is now actively exploited, resulting in its official addition to the Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026. This...

David kimber
David kimber
March 19, 2026 2 Min Read
0 0

A critical security flaw impacting Microsoft SharePoint is now actively exploited, resulting in its official addition to the Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026.

This addition confirms that threat actors are actively exploiting the flaw in real-world network attacks, prompting an urgent call to action for all network administrators who rely on the collaboration platform.

Tracked formally as CVE-2026-20963, this security weakness stems from how Microsoft SharePoint handles the deserialization of untrusted data.

Deserialization is the process by which software converts data structured for storage or network transfer back into live, executable objects in the application’s memory.

When an application fails to verify the safety of incoming data properly, attackers can exploit the process. In this specific SharePoint vulnerability, an unauthorized, remote attacker can carefully craft a malicious data packet and send it to a vulnerable server over the network.

Microsoft SharePoint Vulnerability

When SharePoint attempts to deserialize this untrusted input, it inadvertently triggers the attacker’s embedded instructions.

This flaw enables a threat actor to execute arbitrary code on the host machine without requiring valid user credentials.

Because SharePoint environments typically house highly sensitive enterprise documents and internal communications, a successful remote code execution attack could result in a devastating corporate data breach.

CISA’s decision to add CVE-2026-20963 to the KEV catalog indicates that cybersecurity defenders have observed active exploitation in the wild.

While security researchers have confirmed the ongoing attacks, the specific advanced persistent threat (APT) groups behind these campaigns currently remain unidentified.

Furthermore, CISA notes that the vulnerability’s involvement in active ransomware campaigns is presently unknown. However, remote code execution flaws are highly prized by initial access brokers and ransomware syndicates.

Once code execution is achieved, attackers can easily deploy secondary payloads, establish persistent backdoors, and move laterally across the broader corporate network to launch extortion campaigns.

To mitigate the risk of widespread compromise, CISA has issued strict directives for Federal Civilian Executive Branch (FCEB) agencies.

Under Binding Operational Directive (BOD) 22-01, federal organizations face an exceptionally tight remediation window. All vulnerable instances of Microsoft SharePoint must be completely patched or mitigated by March 21, 2026.

Private-sector organizations are strongly encouraged to adopt this aggressive timeline to protect their digital infrastructure.

Administrators must immediately review Microsoft’s official security advisories and apply all available security updates.

If immediate patching is technically impossible within the environment, organizations must apply vendor-supplied mitigations.

If no alternative mitigations are available, CISA explicitly advises network defenders to discontinue use of the vulnerable product entirely until a permanent fix can be safely implemented.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVECybersecurityExploitPatchransomwareSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

WaterPlum Deploys StoatWaffle Malware in VSCode-Based Supply

Next Post

Iran-Linked Botnet Exposed After Open Directory Leak Reveals

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us