What Happened: Microsoft SharePoint Vulnerability
The Microsoft SharePoint vulnerability identified as CVE-2026-20963 has been officially confirmed as exploited in active attacks. On March 18, 2026, CISA added this flaw to the Known Exploited Vulnerabilities (KEV) catalog. The root cause is insecure deserialization of untrusted data in Microsoft SharePoint, allowing attackers to send specially crafted data to vulnerable servers and execute remote code without needing valid credentials.
Deserialization issues happen when software processes data from storage or network transfer back into live application objects, but fails to properly validate the data. Attackers exploit this weakness to run malicious code directly on the server, creating a critical entry point for further attacks.
Why the Microsoft SharePoint Vulnerability Matters
Microsoft SharePoint is widely used for document management and team collaboration. Exploiting this vulnerability, attackers can:
- Access confidential business files and communications
- Gain unauthorized remote control of SharePoint servers
- Deploy secondary malware, including ransomware
- Move laterally through the corporate network
Security researchers have confirmed exploitation in the wild, though the specific threat actors remain unidentified. While direct links to ransomware campaigns are not yet established, remote code execution vulnerabilities are highly valuable for cybercriminals, initial access brokers, and ransomware groups. The risk of data breaches, extortion, and business disruption is significant.
What To Do: Patch and Protect SharePoint Now
CISA has issued urgent directives for organisations using Microsoft SharePoint. Federal agencies are required to patch or mitigate the vulnerability by March 21, 2026, and private-sector organisations are strongly encouraged to act just as quickly.
- Review Microsoft’s official security advisories and apply all available SharePoint updates without delay
- If patching is not immediately possible, implement all recommended mitigations
- Monitor SharePoint server logs and network activity for unusual or suspicious behaviour
- Restrict administrative access and enforce strong authentication on SharePoint environments
Prompt action is necessary to protect sensitive data and prevent attackers from gaining a foothold in your network. Keeping SharePoint fully updated and monitored is essential for minimising exposure to this critical vulnerability.
Originally reported by Cybersecurity News.







