CybersecurityMarch 22, 20268 min read

CVE-2026-20963: Critical SharePoint RCE Actively Exploited in the Wild

SI

Secured Intel Team

Editor at Secured Intel

CVE-2026-20963: Critical SharePoint RCE Actively Exploited in the Wild

In January 2026, a SOC team at a mid-sized financial services firm received an unusual alert: an unauthenticated POST request to their SharePoint 2019 farm's /_layouts/ endpoint, followed immediately by a new file appearing in a web-accessible directory. No credentials were used. No phishing link was clicked. The attacker needed only a network path to the server. That scenario is no longer hypothetical — it maps almost exactly to how CVE-2026-20963 is now being exploited in real-world attacks.

CISA added this vulnerability to the Known Exploited Vulnerabilities (KEV) catalog and ordered U.S. federal agencies to remediate by March 21, 2026. The patch has been available since January 2026, but active exploitation is already underway. If your organization runs SharePoint Server 2016, 2019, or Subscription Edition on-premises — especially internet-facing — this article covers what you're dealing with, why it matters beyond the CVSS score, and the practical steps to close the gap before your farm becomes a pivot point.

No credentials. No interaction. Just exposure.


What CVE-2026-20963 Is and Why It Is Dangerous

The Vulnerability at a Technical Level

CVE-2026-20963 is a pre-authentication remote code execution (RCE) vulnerability affecting Microsoft SharePoint Server. An unauthenticated attacker with network access to the SharePoint server can write arbitrary files to the server's file system and execute them with the privileges of the SharePoint application pool account — typically a domain service account with broad Active Directory permissions.

The attack requires no user interaction and no valid credentials. The only prerequisite is that the attacker can reach TCP port 443 (or 80) on the SharePoint server. For organizations with internet-facing SharePoint farms — or even those with flat internal networks — the exposure is immediate.

In many environments, SharePoint runs with more privilege than domain controllers are monitored for—making it a high-impact but under-defended target.

This maps to MITRE ATT&CK T1190 (Exploit Public-Facing Application) for initial access, quickly followed by T1059 (Command and Scripting Interpreter) once the attacker's payload executes on the server.

Affected Versions

SharePoint VersionAffectedPatch Available
SharePoint Server 2016YesJanuary 2026 Patch Tuesday
SharePoint Server 2019YesJanuary 2026 Patch Tuesday
SharePoint Subscription EditionYesJanuary 2026 Patch Tuesday
SharePoint Online (Microsoft 365)NoNot applicable
SharePoint 2013 / 2010Not confirmedNo longer supported

Important: SharePoint Online customers are not affected. This vulnerability is exclusive to on-premises deployments. However, hybrid environments — where on-premises farms sync identities or content with Microsoft 365 — face a compounded risk. A compromised on-premises service account could be leveraged to pivot into cloud-connected resources.


Why Attackers Are Actively Exploiting This Now

The Economics of Pre-Auth RCE

Pre-authentication vulnerabilities represent a fundamentally different risk class. Exploits that require credentials depend on phishing, password reuse, or insider access. CVE-2026-20963 removes that dependency entirely.

From an attacker’s perspective, the workflow is efficient:

  • Scan for exposed SharePoint servers using Shodan or Censys
  • Probe the vulnerable endpoint with crafted HTTP requests
  • Drop a web shell for persistent access
  • Move laterally using service account privileges

This pattern mirrors previous large-scale exploitation campaigns such as ProxyLogon (CVE-2021-26855), where tens of thousands of servers were compromised within days of disclosure (Threat Intelligence Reports, 2021).

The timeline is shrinking. In 2024–2025, many KEV-listed vulnerabilities were exploited within 48–72 hours of disclosure (CISA KEV Trends, 2025).

The SharePoint Attack Chain in Practice

A realistic exploitation flow:

  1. Attacker identifies SharePoint servers via scanning platforms
  2. Sends crafted unauthenticated HTTP request (T1190)
  3. Writes a web shell (.aspx) to a web-accessible path (T1505.003)
  4. Executes commands under SharePoint service account context
  5. Harvests credentials or tokens (T1078)
  6. Moves laterally across the environment

Pro Tip: Check your SharePoint service account privileges immediately. Excessive Active Directory permissions significantly increase post-exploitation impact.

Why This Often Goes Undetected

  • IIS traffic blends seamlessly with normal business operations
  • SharePoint servers are rarely monitored with the same rigor as domain controllers
  • Service account activity is often not baselined

If your SharePoint server is reachable and unpatched, assume it has already been scanned.


Detection: What to Look For in Your Environment

SOC Detection Opportunities

Effective detection requires focusing on high-signal behaviors:

Attack StageLog SourceDetection Signal
Initial exploitationIIS/WAF logsUnauthenticated POST to /_layouts/ or /_api/
Web shell creationFile system / SysmonNew .aspx or .ashx files
Command executionEDR / Sysmonw3wp.exe spawning cmd.exe or powershell.exe
Credential abuseSecurity logsService account unusual authentication
Lateral movementNetwork logsNew outbound internal connections

The most reliable indicator is process lineage. w3wp.exe should not spawn command shells under normal conditions.

MITRE ATT&CK Coverage Mapping

TechniqueDescriptionDetection Strategy
T1190Exploit public-facing applicationMonitor IIS/WAF logs
T1505.003Web shellFile integrity monitoring
T1059Command executionEDR behavioral alerts
T1078Valid accountsUEBA baselining
T1021Remote servicesNetwork segmentation monitoring

Important: Many organizations deploy monitoring tools but fail to operationalize alerts. Detection without response capability provides little security value.


Remediation: Patch First, Then Harden

Patching Priority and Process

Microsoft released patches in January 2026. Treat this as an emergency change:

  1. Apply the January 2026 cumulative update
  2. Run the SharePoint Products Configuration Wizard
  3. Verify patch installation using PowerShell

Failure to run the configuration wizard leaves systems partially vulnerable.

Network-Level Mitigations

If patching is delayed:

  • Restrict SharePoint access via firewall or WAF
  • Block unauthenticated access to sensitive endpoints
  • Limit outbound connections from SharePoint servers
  • Monitor IIS logs in real time

These controls reduce exposure but do not eliminate the vulnerability.

Post-Patch Hardening

ActionFrameworkPriority
Apply patch and run config wizardNIST SP 800-40Immediate
Reduce service account privilegesCIS Control 5High
Enable file integrity monitoringCIS Control 3High
Restrict network accessNIST SP 800-53 SC-7High
Rotate credentialsISO 27001 A.9Medium

Incident Response: If You Suspect Compromise

Immediate Actions

  1. Review IIS logs for suspicious requests since January 2026
  2. Identify unauthorized .aspx or .ashx files
  3. Analyze service account activity in AD logs
  4. Check for persistence mechanisms (tasks, services, registry changes)
  5. Isolate affected systems if compromise is confirmed

Pro Tip: Use behavioral detection (e.g., YARA rules) to identify obfuscated web shells rather than relying solely on string matching.

If a web shell is found, assume full environment compromise and initiate incident response per NIST SP 800-61.


Key Takeaways

  • Patch immediately — active exploitation is confirmed and ongoing
  • Assume exposure if unpatched — scanning and probing are already happening
  • Monitor process behavior — especially w3wp.exe spawning shells
  • Reduce service account privileges to limit blast radius
  • Audit SharePoint directories for unauthorized files
  • Validate detection workflows — alerts must lead to action

Conclusion

CVE-2026-20963 represents a high-impact, pre-authentication RCE vulnerability targeting a core enterprise platform. SharePoint environments often store sensitive business data and operate with elevated privileges, making them ideal targets for attackers seeking rapid lateral movement.

The mitigation path is clear: apply patches, validate configurations, reduce privileges, and strengthen detection. Organizations that delay action risk turning SharePoint into an entry point for broader compromise.

With vulnerabilities like this, the difference between patched and compromised is often measured in days—not months.


Frequently Asked Questions

Q: Does this affect SharePoint Online or Microsoft 365? A: No. The vulnerability affects only on-premises SharePoint Server versions (2016, 2019, Subscription Edition). SharePoint Online is managed by Microsoft and is not impacted.

Q: What does pre-authentication mean in this context? A: It means attackers do not need valid credentials. They only require network access to the SharePoint server to exploit the vulnerability.

Q: How can I check if my SharePoint is internet-facing? A: Review DNS records, firewall rules, and public IP exposure. Tools like Shodan can also help identify externally accessible services.

Q: Is patching enough to secure the system? A: Patching prevents future exploitation, but you must also verify no compromise has already occurred and review logs and file systems.

Q: What frameworks require remediation of this vulnerability? A: Frameworks such as PCI DSS, HIPAA, SOC 2, and ISO 27001 require timely vulnerability remediation. CISA KEV inclusion further increases urgency.

Secured Intel

Enjoyed this article?

Subscribe for more cybersecurity insights.

Subscribe Free