The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive adding two Microsoft SharePoint Server vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerabilities, CVE-2023-29357 and CVE-2023-24955, can be chained by an unauthenticated attacker to achieve remote code execution (RCE) with the privileges of the SharePoint server. Due to evidence of active exploitation, CISA has mandated that federal agencies patch these flaws. This warning serves as a critical alert for all public and private sector organizations running on-premise SharePoint servers to verify they are patched and secure.
The attack combines two powerful vulnerabilities:
Site Owner permissions can inject and execute arbitrary commands on the server.By chaining these two, an attacker can first use CVE-2023-29357 to gain administrator privileges without needing credentials. Then, using those elevated privileges, they can exploit CVE-2023-24955 to execute code on the underlying server, achieving a full, unauthenticated RCE.
The attack chain is dangerously simple and effective:
"alg":"none" header. Due to the flaw, the server accepts this unsigned token, allowing the attacker to impersonate a site administrator.T1190 - Exploit Public-Facing Application: The initial attack vector targeting the internet-facing SharePoint server.T1068 - Exploitation for Privilege Escalation: Specifically using CVE-2023-29357 to bypass authentication.T1505.003 - Server Software Component: Web Shell: A common follow-on action where attackers upload a web shell for persistent access after gaining RCE.T1059.001 - Command and Scripting Interpreter: PowerShell: The likely method used to execute commands via CVE-2023-24955.A successful exploit of this vulnerability chain leads to a complete compromise of the SharePoint server. The impact includes:
"alg":"none". Specifically, look for requests to endpoints like /_api/sp.identity.setauthenticated. w3wp.exe), such as cmd.exe, powershell.exe, or other reconnaissance commands (whoami, ipconfig).D3-NTA: Network Traffic Analysis to detect anomalous requests to SharePoint API endpoints. Use D3-WPA: Web Protocol Anomaly Detection to flag malformed JWTs or other protocol-level attacks.D3-SU: Software Update. This should be complemented by D3-ITF: Inbound Traffic Filtering via a WAF.Applying the June 2023 (or later) security updates for SharePoint Server is the only definitive way to remediate these vulnerabilities.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to filter and inspect traffic to the SharePoint server, potentially blocking exploit attempts at the network edge.
Mapped D3FEND Techniques:
The active exploitation of this vulnerability chain makes patching an immediate, critical priority. All organizations running on-premise Microsoft SharePoint Server must verify that the June 2023 Security Update (or a more recent cumulative update) is installed. Use enterprise vulnerability scanning tools to confirm the patch status across all SharePoint farms. For multi-server farms, ensure the patch is consistently applied to every server role (Web Front End, Application, etc.). Given the severity and CISA KEV status, any unpatched, internet-facing SharePoint server should be considered compromised until proven otherwise.
To detect attempts to exploit CVE-2023-29357, security teams should configure their WAF, IDS, or network monitoring tools to inspect the Authorization header of incoming HTTP requests to SharePoint servers. Specifically, create a rule to flag any request containing a JSON Web Token (JWT) that specifies "alg":"none". This is a clear indicator of an attempt to bypass authentication, as legitimate tokens must be signed with a cryptographic algorithm. Alerting on this anomaly can provide an early warning of an attack, even before RCE is achieved. This detection should be treated as a high-confidence indicator of malicious activity and trigger an incident response playbook.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats