VulnerabilitiesHIGH

Vulnerabilities - ScreenConnect Servers and SharePoint Flaw Exploited

HNHelp Net Security
CVE-2026-20963CVE-2026-3564CVE-2026-20131Microsoft SharePointScreenConnect
🎯

Basically, hackers are using weaknesses in software to break into systems and steal information.

Quick Summary

Recent vulnerabilities in ScreenConnect and Microsoft SharePoint are under active exploitation. Organizations using these platforms must patch them immediately to avoid serious breaches. Stay informed and secure your systems now!

The Flaw

Last week, cybersecurity experts reported two significant vulnerabilities that are currently being exploited by attackers. The first is a remote code execution (RCE) flaw in Microsoft SharePoint, identified as CVE-2026-20963. This vulnerability allows attackers to execute arbitrary code on affected systems, posing a severe risk to organizations using SharePoint. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Known Exploited Vulnerabilities catalog, highlighting its active exploitation in the wild.

The second vulnerability, CVE-2026-3564, affects the ScreenConnect remote access platform. This flaw allows attackers to hijack sessions by abusing ASP.NET machine keys to forge trusted authentication. ScreenConnect is widely used by managed service providers and IT departments, making this vulnerability particularly concerning as it could lead to unauthorized access to sensitive systems.

What's at Risk

Organizations using Microsoft SharePoint are at high risk due to the RCE vulnerability. If exploited, attackers can gain control over the SharePoint server, potentially leading to data breaches or further infiltration into the organization’s network. The implications of such access can be devastating, including loss of sensitive data, disruption of services, and significant financial repercussions.

Similarly, the ScreenConnect vulnerability exposes users to session hijacking, which can compromise remote support operations. This could allow attackers to manipulate systems, access confidential information, or deploy malware, making it crucial for organizations to address this vulnerability promptly.

Patch Status

Microsoft has already released a patch for the SharePoint vulnerability in January 2026, but many organizations may not have applied it yet. CISA's warning serves as a critical reminder for users to ensure that their systems are updated to protect against this active exploitation. On the other hand, ConnectWise has issued a patch for the ScreenConnect vulnerability, and users must implement this fix immediately to safeguard their remote access sessions.

Immediate Actions

Organizations should take the following steps to mitigate the risks associated with these vulnerabilities:

  • Update Software: Ensure that all systems running Microsoft SharePoint and ScreenConnect are updated with the latest patches.
  • Monitor for Exploitation: Keep an eye on network traffic and logs for any signs of exploitation or unauthorized access attempts.
  • Educate Staff: Train employees about the risks associated with these vulnerabilities and the importance of reporting suspicious activities.
  • Implement Security Best Practices: Adopt security measures such as multi-factor authentication and least privilege access to minimize potential impacts.

By taking these actions, organizations can significantly reduce their risk exposure and better protect their systems from malicious actors.

🔒 Pro insight: Analysis pending for this article.

Original article from

Help Net Security · Help Net Security

Read Full Article

Related Pings

CRITICALVulnerabilities

Oracle Patches Critical CVE-2026-21992 - Unauthenticated RCE

Oracle has patched a critical vulnerability in its Identity Manager and Web Services Manager. This flaw allows unauthenticated remote code execution, posing serious risks to users. Immediate updates are essential to safeguard systems.

The Hacker News·
HIGHVulnerabilities

KACE Vulnerability - Critical Exploitation in Education Sector

A critical vulnerability in Quest KACE, CVE-2025-32975, has been exploited in attacks, primarily impacting the education sector. Organizations must act quickly to apply patches and protect their systems.

SecurityWeek·
HIGHVulnerabilities

Vulnerabilities - PolyShell Flaw Exposes Magento to Attacks

A critical flaw in Magento and Adobe Commerce allows unauthorized file uploads, risking XSS attacks. Many online stores are affected, highlighting the urgent need for security measures. Immediate action is essential to protect sensitive data and maintain operational integrity.

Security Affairs·
HIGHVulnerabilities

Vulnerabilities - CISA Flags Apple and CMS Bugs for Patching

CISA has flagged critical vulnerabilities in Apple and CMS platforms. Federal agencies must patch these by April 2026 to avoid exploitation. Stay ahead of threats by ensuring timely updates.

The Hacker News·
HIGHVulnerabilities

Vulnerabilities - CodeBreach Exposes AWS Console Supply Chain

A critical vulnerability in AWS CodeBuild has been uncovered, allowing attackers to hijack GitHub repositories. This flaw poses a significant risk of credential theft and malicious code injection. AWS has addressed the issue, but organizations must remain vigilant against similar vulnerabilities.

CyberWire Daily·
HIGHVulnerabilities

Trivy Vulnerability Scanner - Backdoored with Credential Stealer

A serious breach has compromised the Trivy vulnerability scanner, injecting malware into its official releases. Thousands of developers are at risk as the attack targets CI/CD workflows. Immediate action is needed to rotate secrets and secure environments against potential supply chain attacks.

CSO Online·