【概要】
| 公開日 |
登録日 |
CVE番号 |
NVD |
ベンダー |
CVSS v3 |
CWE |
脆弱性 |
KEV |
備考 |
|---|---|---|---|---|---|---|---|---|---|
| 2023/05/09 | 2023/01/31 | CVE-2023-24955 | NVD | Microsoft | 7.2(Microsoft) |
CWE-94 | コード・インジェクション | 2024/03/26 | |
| 2024/07/09 | 2024/06/11 | CVE-2024-38094 | NVD | Microsoft | 7.2(Microsoft) |
CWE-502 | 信頼できないデータのデシリアライゼーション | 2024/10/22 | Exploit Code あり |
| 2024/07/09 | 2024/06/11 | CVE-2024-38023 | NVD | Microsoft | 7.2(Microsoft) |
CWE-502 | 信頼できないデータのデシリアライゼーション | - | Exploit Code あり |
| 2024/07/09 | 2024/06/11 | CVE-2024-38024 | NVD | Microsoft | 7.2(Microsoft) |
CWE-502 | 信頼できないデータのデシリアライゼーション | - | Exploit Code あり |
| 2025/07/08 | 2025/06/09 | CVE-2025-49704 | NVD | Microsoft | 8.8(Microsoft) |
CWE-94 | コード・インジェクション | 2025/07/22 | |
| 2025/07/08 | 2025/06/09 | CVE-2025-49706 | NVD | Microsoft | 6.5(Microsoft) |
CWE-287 | 不適切な認証 | 2025/07/22 | |
| 2025/07/19 | 2025/07/09 | CVE-2025-53770 | NVD | Microsoft | 9.8(Microsoft) |
CWE-502 | 信頼できないデータのデシリアライゼーション | 2025/07/20 | SharePoint |
| 2025/07/20 | 2025/07/09 | CVE-2025-53771 | NVD | Microsoft | 6.5(Microsoft) |
CWE-20 CWE-22 CWE-707 |
不適切な入力確認 パス・トラバーサル 不適切な無害化 |
- | SharePoint |
【SharePoint 】
◆CVE-2025-49704 (まとめ)
https://vul.hatenadiary.com/entry/49704
◆CVE-2025-49706 (まとめ)
https://vul.hatenadiary.com/entry/CVE-2025-49706
◆CVE-2025-53770 (まとめ)
https://vul.hatenadiary.com/entry/CVE-2025-53770
◆ToolShell (まとめ)
https://vul.hatenadiary.com/entry/ToolShell
【ニュース】
■2024年
◇2024年3月
◆「SharePoint Server」の脆弱性悪用に要警戒 - 米当局が注意喚起 (Security NEXT, 2024/03/27)
https://www.security-next.com/155261
⇒ https://vul.hatenadiary.com/entry/2024/03/27/000000
◇2024年10月
◆7月修正の「SharePoint」脆弱性、悪用が発生 - 米政府が注意喚起 (Security NEXT, 2024/10/23)
https://www.security-next.com/163298
⇒ https://vul.hatenadiary.com/entry/2024/10/23/000000
■2025年
◇2025年7月
◆Microsoft SharePoint zero-day exploited in RCE attacks, no patch available (BleepingComputer, 2025/07/20 11:40)
[マイクロソフトのSharePointのゼロデイ脆弱性がリモートコード実行(RCE)攻撃に悪用され、パッチは未公開です]
https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/
⇒ https://vul.hatenadiary.com/entry/2025/07/20/000000
◆Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (BleepingComputer, 2025/07/21 12:41)
[マイクロソフトは、攻撃で悪用されたSharePointのRCE脆弱性に対処するため、緊急のパッチをリリースしました]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/
⇒ https://vul.hatenadiary.com/entry/2025/07/21/000000
【Exploit Code】
【検索】
google: SharePoint
google:news: SharePoint
google: site:virustotal.com SharePoint
google: site:github.com SharePoint
■Bing
https://www.bing.com/search?q=SharePoint
https://www.bing.com/news/search?q=SharePoint
https://twitter.com/search?q=%23SharePoint
https://twitter.com/hashtag/SharePoint
■Exploit Code / PoC
https://www.exploit-db.com/search?q=SharePoint
https://attackerkb.com/search?q=SharePoint
【関連まとめ記事】
◆アプリケーション (まとめ)
https://vul.hatenadiary.com/entry/Application