Impact
The vulnerability involves insecure deserialization of untrusted data in Microsoft Office SharePoint. An attacker who has authorized access can cause code to run on the SharePoint server, enabling compromise of confidentiality, integrity, and availability of the affected system. The weakness is classified as CWE-502, which signifies an improper deserialization of untrusted data. This flaw can allow an attacker to execute arbitrary code and gain full control over the server where the SharePoint service is running.
Affected Systems
Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2019, and Microsoft SharePoint Server Subscription Edition are impacted by this vulnerability. No specific version details are listed, so all current releases of these products are considered at risk.
Risk and Exploitability
The CVSS score of 8 indicates high severity. The EPSS score is not available, so the current probability of exploitation is unknown, but the absence from the CISA KEV catalog does not reduce the risk. The flaw is exploitable over a network by an attacker who already has authorized access to the SharePoint instance, but the high impact of remote code execution makes this a critical threat if an attacker can obtain such access. The architecture of SharePoint allows the deserialization process to be triggered by external inputs, implying that an attacker could prepare a malicious payload and deliver it via a crafted network request to achieve the exploit.
OpenCVE Enrichment