Home / Posts / CISA Alert: SharePoint RCE

CISA Alert: The SharePoint RCE Vulnerability (CVE-2026-20963)

March 19, 2026 Dillip Chowdary

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive regarding a critical Remote Code Execution (RCE) vulnerability in Microsoft SharePoint Server, tracked as CVE-2026-20963. With a CVSS v4.0 score of 9.8, this flaw represents an existential risk to federal networks and private enterprises alike. Initial reports suggest that state-sponsored actors are already exploiting the vulnerability to gain initial access to high-value targets in the defense and financial sectors.

This vulnerability is particularly insidious because it targets the SharePoint Workflow Service, a core component often left exposed to internal and sometimes external networks to facilitate business process automation. The flaw allows an unauthenticated attacker to bypass existing security controls and execute code with the same privileges as the SharePoint Service Account, which in many legacy environments possesses Domain Admin-level permissions.

Technical Breakdown: Insecure Deserialization

The root cause of CVE-2026-20963 lies in the insecure deserialization of untrusted data within the SharePoint Workflow Service. Specifically, the vulnerability resides in how the server processes XAML (Extensible Application Markup Language) payloads via the internal Microsoft.SharePoint.Workflow.IVerbProp interface. An attacker can craft a malicious SOAP request containing a serialized object that, when processed, triggers a gadget chain leading to code execution.

Unlike previous SharePoint flaws that required a valid user session, this "pre-auth" RCE is particularly dangerous because it bypasses Multi-Factor Authentication (MFA) requirements for initial entry. The exploit chain typically involves a heap spray to stabilize the execution environment before deploying a Cobalt Strike beacon. Security researchers have noted that the payload is often delivered via the /_vti_bin/Workflow.asmx endpoint, which is frequently whitelisted in Web Application Firewalls (WAFs) to ensure workflow continuity.

Deep dive analysis reveals that the vulnerability is triggered by a lack of Type Validation during the deserialization of the PropertyBag object. By using a specially crafted System.Windows.Data.ObjectDataProvider gadget, an attacker can invoke any method within any loaded assembly. This "primitive" is then used to call System.Diagnostics.Process.Start, giving the attacker a full command-line interface on the target server.

Critical Indicator

Look for unusual w3wp.exe child processes spawning cmd.exe or powershell.exe with encoded commands originating from the /_vti_bin/ directory. Additionally, monitor for unexpected outbound connections on port 4444 or 8080 from SharePoint front-end servers.

Exploitation in the Wild

Security researchers at Mandiant have observed the threat group APT45 utilizing a zero-day exploit for this flaw since early March. The attackers are using a sophisticated obfuscation layer that mimics legitimate SharePoint administrative traffic, making detection via traditional Intrusion Detection Systems (IDS) extremely difficult. Once the RCE is achieved, the actors move laterally using Pass-the-Hash (PtH) attacks or by exploiting Kerberos Delegation misconfigurations.

In several documented cases, the attackers leveraged the compromised SharePoint server to access SQL Server databases containing sensitive PII (Personally Identifiable Information). By injecting malicious Stored Procedures, they were able to maintain persistence even after the SharePoint server was rebooted. This highlights the importance of a layered defense strategy that includes rigorous database auditing.

The CISA directive (ED 26-03) mandates that all federal agencies apply the latest security updates by March 21, 2026. For organizations unable to patch immediately, CISA recommends disabling the Workflow Service and blocking ports 80/443 for internal SharePoint instances from the public internet. However, these mitigations are "band-aids" and do not address the underlying vulnerability.

Mitigation and Remediation

Microsoft has released a cumulative update (CU) that implements a strict allowlist for deserializable types within the Workflow engine. Organizations should also ensure that Microsoft Defender for Endpoint is updated to the latest signature set to detect the specific memory signatures associated with this exploit. Furthermore, it is highly recommended to implement Attack Surface Reduction (ASR) rules to block the creation of child processes by web servers.

Post-patching, it is vital to audit all SharePoint service accounts for signs of compromise. Check the ULS logs for entries containing Exception: System.Runtime.Serialization.SerializationException paired with external IP addresses. If these indicators are found, a full incident response (IR) engagement is recommended, as the presence of these logs often indicates a failed exploit attempt that may have been followed by a successful one using a different technique.

Finally, organizations should move toward a Zero Trust architecture for internal applications. This includes segmenting SharePoint farms from the rest of the network and requiring Identity-Aware Proxy (IAP) access for all administrative functions. The era of the "soft middle" in enterprise networks is over, and CVE-2026-20963 is a stark reminder of the cost of technical debt in cybersecurity.

Build Your Security Knowledge Base

Keep track of CVE analysis, exploit chains, and remediation steps with ByteNotes. Organize your cybersecurity research and share findings with your SOC team effortlessly.

Try ByteNotes for Free →