Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53771: CWE-287: Improper Authentication in Microsoft Microsoft SharePoint Enterprise Server 2016

0
Medium
VulnerabilityCVE-2025-53771cvecve-2025-53771cwe-287
Published: Sun Jul 20 2025 (07/20/2025, 22:16:52 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:33:40 UTC

Technical Analysis

CVE-2025-53771 is an authentication bypass vulnerability classified under CWE-287, affecting Microsoft SharePoint Enterprise Server 2016 version 16.0.0. The vulnerability allows an attacker to spoof authentication over the network without requiring any privileges or user interaction. This means an unauthenticated attacker can impersonate legitimate users or services, potentially gaining unauthorized access to sensitive information or manipulating data within SharePoint environments. The CVSS 3.1 score of 6.5 reflects a medium severity, with the attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope remains unchanged (S:U), and the impact affects confidentiality and integrity partially (C:L/I:L) but not availability (A:N). The exploitability is rated as proof-of-concept (E:P), and the remediation level is official (RL:O) with confirmed reports (RC:C). No patches or exploit code are currently publicly available, but the vulnerability poses a risk of unauthorized access and data spoofing in enterprise environments relying on SharePoint for document management and collaboration. The flaw could be leveraged in targeted attacks to bypass authentication controls, potentially leading to data leakage or manipulation.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to confidential documents and collaboration data stored in SharePoint Enterprise Server 2016. The spoofing capability may allow attackers to impersonate legitimate users or services, undermining trust in authentication mechanisms and potentially enabling further lateral movement within networks. Sectors such as government, finance, healthcare, and critical infrastructure that rely heavily on SharePoint for internal communication and document sharing are at heightened risk. The medium severity indicates that while the vulnerability is serious, it does not directly impact system availability, reducing the likelihood of widespread denial-of-service conditions. However, the compromise of confidentiality and integrity could result in data breaches, regulatory non-compliance (e.g., GDPR), and reputational damage. The lack of required privileges or user interaction increases the risk of exploitation, especially in environments where SharePoint servers are exposed to untrusted networks or insufficiently segmented.

Mitigation Recommendations

Until an official patch is released, European organizations should implement network-level mitigations such as restricting external access to SharePoint servers via firewalls and VPNs, and enforcing strict network segmentation to isolate SharePoint infrastructure from untrusted networks. Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous authentication or spoofing attempts targeting SharePoint. Enable and closely monitor detailed authentication and access logs within SharePoint to identify suspicious activities early. Consider implementing multi-factor authentication (MFA) for SharePoint access where possible to add an additional layer of security. Regularly review and minimize permissions assigned within SharePoint to reduce potential impact. Prepare incident response plans specific to SharePoint compromise scenarios and ensure timely application of official patches once available. Engage with Microsoft support channels for updates on patch releases and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T13:25:25.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687d6e36a83201eaac051192

Added to database: 7/20/2025, 10:31:18 PM

Last enriched: 2/14/2026, 10:33:40 AM

Last updated: 3/25/2026, 1:17:50 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses