轉發 台灣電腦網路危機處理暨協調中心 TWCERTCC-200-202510-00000008
[內容說明]
Microsoft SharePoint Server 是一款企業級協作平台,提供文件管理與團隊協作等功能,是企業資訊整合的核心平台。 【CVE-2025-59228,CVSS:8.8】 此為不正確輸入驗證漏洞,允許經授權的攻擊者透過網路執行程式碼。 【CVE-2025-59237,CVSS:8.8】 此為未受信任之資料反序列化漏洞,允許經授權的攻擊者透過網路執行程式碼。
[影響平台]
● Microsoft SharePoint Enterprise Server 2016
● Microsoft SharePoint Server 2019
● Microsoft SharePoint Server Subion Edition
[建議措施]
根據官方網站釋出解決方式進行修補:
【CVE-2025-59228】
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228
【CVE-2025-59237】
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237
[參考資料]
https://www.twcert.org.tw/tw/cp-169-10446-b41fa-1.html
Forwarded by Taiwan Computer Network Crisis Response and Coordination Center (TWCERTCC-200-202510-00000008)
[Description]
Microsoft SharePoint Server is an enterprise-class collaboration platform that provides document management and team collaboration features. It is the core platform for enterprise information integration. [CVE-2025-59228, CVSS: 8.8] This is an improper input validation vulnerability that could allow an authenticated attacker to execute code over the network. [CVE-2025-59237, CVSS: 8.8] This is an untrusted data deserialization vulnerability that could allow an authenticated attacker to execute code over the network.
[Affected Platforms]
● Microsoft SharePoint Enterprise Server 2016
● Microsoft SharePoint Server 2019
● Microsoft SharePoint Server Subscription Edition
[Recommended Action]
Patch according to the solution released on the official website:
[CVE-2025-59228]
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228
[CVE-2025-59237]
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237
[References]
https://www.twcert.org.tw/tw/cp-169-10446-b41fa-1.html