CISA warns that Microsoft SharePoint is vulnerable to attacks A serious security hole in Microsoft SharePoint has been found to be actively used, and on March 18, 2026, it was officially added to the Known Exploited Vulnerabilities (KEV) list This article explores microsoft sharepoint vulnerable. . This new information shows that threat actors are using the flaw in real-world network attacks, which means that all network administrators who use the collaboration platform need to act quickly.
CVE-2026-20963 is the official name for this security hole. It has to do with how Microsoft SharePoint handles the deserialization of untrusted data. Deserialization is the process by which software turns data that has been set up for storage or network transfer back into live, executable objects in the application's memory.
Attackers can take advantage of the process when an application doesn't properly check the safety of incoming data. An unauthorized remote attacker can carefully make a malicious data packet and send it over the network to a SharePoint server that is vulnerable. Weakness in Microsoft SharePoint When SharePoint tries to deserialize this untrusted input, it accidentally runs the attacker's hidden commands.
This flaw lets a threat actor run any code on the host machine without needing valid user credentials. SharePoint environments often hold very private business documents and internal communications. If a remote code execution attack were to work, it could lead to a huge data breach for the company.
CISA's choice to add CVE-2026-20963 to the KEV catalog shows that cybersecurity defenders have seen it being used in the real world. Security researchers have confirmed that the attacks are still happening, but they don't know which advanced persistent threat (APT) groups are behind them. CISA also says that it is not currently known how the vulnerability is being used in active ransomware campaigns.
But initial access brokers and ransomware groups really want flaws that let them run code from a distance. Once code execution is successful, attackers can easily install secondary payloads, set up permanent backdoors, and move across the larger corporate network to start extortion campaigns. CISA has given Federal Civilian Executive Branch (FCEB) agencies strict rules to follow in order to reduce the risk of widespread compromise.
According to Binding Operational Directive (BOD) 22-01, federal agencies have a very short time frame to fix problems. By March 21, 2026, all Microsoft SharePoint instances that are vulnerable must be completely patched or fixed. Private-sector groups are strongly urged to follow this strict schedule to keep their digital infrastructure safe.
Administrators need to read Microsoft's official security advisories right away and install all security updates that are available. Organizations must use vendor-provided mitigations if it is not possible to patch right away in the environment. CISA clearly tells network defenders to stop using the vulnerable product completely until a permanent fix can be safely put in place if there are no other ways to protect it., LinkedIn, and X for daily news about cybersecurity. Get in touch with us to share your stories.












