Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30384: CWE-502: Deserialization of Untrusted Data in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2025-30384cvecve-2025-30384cwe-502
Published: Tue May 13 2025 (05/13/2025, 16:58:44 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:24:40 UTC

Technical Analysis

CVE-2025-30384 is a high-severity vulnerability affecting Microsoft SharePoint Enterprise Server 2016 (version 16.0.0). The vulnerability is classified under CWE-502, which involves the deserialization of untrusted data. Deserialization vulnerabilities occur when an application processes serialized data from untrusted sources without proper validation or sanitization, allowing attackers to manipulate the data to execute arbitrary code. In this case, an unauthorized attacker can exploit this flaw to execute code locally on the SharePoint server. The CVSS 3.1 base score is 7.4, indicating a high impact with the vector AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access with high attack complexity, no privileges, and no user interaction, but can fully compromise confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the critical role SharePoint plays in enterprise collaboration and document management. The lack of available patches at the time of publication increases the urgency for organizations to implement mitigations. The vulnerability allows code execution locally, which could be leveraged by attackers who have gained limited access to escalate privileges or move laterally within a network. Given SharePoint's integration with other Microsoft services and its widespread use in enterprise environments, this vulnerability could be a vector for broader compromise if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-30384 could be substantial. SharePoint Enterprise Server 2016 is widely used across various sectors including government, finance, healthcare, and large enterprises for document management and collaboration. Successful exploitation could lead to unauthorized code execution on critical servers, resulting in data breaches, disruption of business operations, and potential exposure of sensitive information protected under regulations such as GDPR. The high impact on confidentiality, integrity, and availability means attackers could steal or alter sensitive data, deploy ransomware, or disrupt services. Given the local access requirement, the threat is particularly relevant in scenarios where attackers have already gained foothold inside the network, such as through phishing or insider threats. The absence of known exploits currently provides a window for proactive defense, but organizations should not underestimate the risk given the potential for rapid weaponization once exploit code becomes available.

Mitigation Recommendations

Beyond applying patches when they become available, European organizations should implement several specific mitigations: 1) Restrict and monitor local access to SharePoint servers, ensuring only trusted administrators have access. 2) Employ network segmentation to isolate SharePoint servers from less trusted network zones, limiting lateral movement opportunities. 3) Use application whitelisting and endpoint protection to detect and prevent unauthorized code execution on SharePoint servers. 4) Enable detailed logging and continuous monitoring of SharePoint server activities to detect anomalous behavior indicative of exploitation attempts. 5) Conduct regular security audits and vulnerability assessments focused on deserialization risks and input validation in custom SharePoint extensions or integrations. 6) Educate IT staff about the risks of deserialization vulnerabilities and the importance of applying security updates promptly. 7) Implement strict access controls and multi-factor authentication for administrative accounts to reduce the risk of unauthorized local access. These measures, combined with timely patching, will reduce the attack surface and improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-21T19:09:29.814Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb9e9

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:24:40 AM

Last updated: 10/4/2025, 1:06:29 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats