Security & Infrastructure Tools
Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks
More than 1,300 Microsoft SharePoint servers remain online and unpatched against CVE-2026-32201, a spoofing vulnerability affecting SharePoint Server 2016, 2019, and Subscription Edition. Exploitation could allow attackers to view or modify sensitive data with a low-complexity, no-interaction attack, though it cannot disable access to the resource. Microsoft released patches in April 2026, but Shadowserver reports only a small number of systems have been updated. CISA added CVE-2026-32201 to its Known Exploited Vulnerabilities catalog and ordered Federal Civilian Executive Branch agencies to patch by April 28 under BOD 22-01. The April Patch Tuesday also fixed 167 vulnerabilities, including two zero-days.

OVER 1,300 MICROSOFT SHAREPOINT SERVERS VULNERABLE TO SPOOFING ATTACKS
- Overview
- A security vulnerability, tracked as CVE-2026-32201, affects Microsoft SharePoint Server deployments including SharePoint Enterprise Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition (the current on‑premises version with continuous updates).
- Exploitation can enable network spoofing by attackers without privileges, leveraging an improper input validation weakness. Attacks are described as low‑complexity and do not require user interaction.
- The vulnerability was disclosed and addressed as part of the April 2026 Patch Tuesday fixes.
- Affected Versions and Scope
- Impacted products: SharePoint Enterprise Server 2016, SharePoint Server 2019, SharePoint Server Subscription Edition.
- The vulnerability is treated as a zero‑day by Microsoft at the time of initial remediation, with patches released to close the flaw in the same update cycle.
- Microsoft’s advisory notes that exploitation could allow a threat actor to view sensitive information (confidentiality), and to make changes to disclosed information (integrity), while not enabling full control over availability.
- Exploitation and Exposure
- Internet security observers have warned that more than 1,300 SharePoint servers remain online and unpatched, continuing to be exposed to potential spoofing abuse.
- Shadowserver reported that fewer than 200 systems had been patched since the patch release, leaving a substantial number of vulnerable endpoints across various environments.
- The combination of unpatched servers and the ongoing threat landscape indicates an active risk surface for organizations that rely on SharePoint on‑premises.
- Patch and Response Timeline
- April 14, 2026: Microsoft released security updates addressing CVE-2026-32201 along with fixes for 167 total vulnerabilities, including two zero‑days.
- The same day, CISA added CVE‑2026‑32201 to its Known Exploited Vulnerabilities (KEV) Catalog, signaling the vulnerability as high risk and requiring attention from U.S. federal entities and partners.
- CISA mandated patching actions for Federal Civilian Executive Branch (FCEB) agencies, setting a two‑week deadline by April 28 under Binding Operational Directive (BOD) 22‑01.
- The guidance emphasized applying vendor mitigations, aligning with BOD 22‑01 for cloud services, or discontinuing use of affected products where mitigations were unavailable.
- In the broader context, a separate high‑risk Windows Task Host privilege escalation vulnerability was highlighted in the wild, underscoring the urgency for prompt remediation across federal and civilian systems.
- Government and Industry Guidance
- The KEV catalog inclusion signals to government and critical infrastructure operators that this CVE is actively exploited in the wild and requires prioritized action.
- BOD 22‑01 specifies timelines for remediation within federal environments, reinforcing the expectation that exposed SharePoint servers be addressed within the stated window.
- The advisory also calls for adherence to vendor mitigation steps and consideration of alternative arrangements if fixes are not yet accessible on certain deployments.
- Patch Tuesday Summary and Implications
- The April 2026 Patch Tuesday encompassed a broad set of fixes, with CVE-2026-32201 among the notable zero‑day remedied in this cycle.
- The consolidation of patches in a single release highlights Microsoft’s approach to addressing multiple threats simultaneously, while the KEV listing reinforces the importance of rapid deployment in affected environments.
- Observers continue to monitor post‑patch activity to determine the effectiveness of remediation efforts and to identify any residual exploitation attempts targeting unpatched systems.
- Visual Data and Monitoring
- Security watchers have relied on dashboards and visualization to track unpatched versus patched SharePoint instances and to assess geographic and organizational distribution of vulnerable servers.
- The available figures illustrate a persistent exposure risk, with clusters of unpatched deployments across different regions and sectors, underscoring the challenge of comprehensive remediation in large, heterogeneous environments.
- Related Coverage and Context
- Ongoing security reporting connects CVE-2026-32201 to broader campaigns that exploit web‑accessible services and collaboration platforms.
- Additional articles in the security press highlight contemporaneous vulnerabilities and exploit‑friendly configurations affecting enterprise ecosystems, including other popular middleware and web application components.
- Industry analyses emphasize the interconnected nature of these flaws and the importance of holistic patch management practices in reducing risk exposure.
- Observations and Takeaways
- The combination of a zero‑day designation, active exploitation, and a sizeable population of unpatched SharePoint servers creates a continued risk‑to‑enterprise landscape.
- As with similar vulnerabilities, rapid patch adoption and verification of patch integrity are critical to limiting potential spoofing and information disclosure scenarios.
- The alignment between vendor advisories, KEV cataloging, and government directive emphasizes a coordinated approach to mitigating exposure across both private and public sectors.
- Closing Notes
- The situation surrounding CVE-2026-32201 illustrates how quickly a flaw can move from disclosure to exploitation in the wild, and how important timely remediation remains for enterprise security.
- Ongoing monitoring of patched versus unpatched deployments, along with awareness of related high‑risk vulnerabilities, continues to be essential for organizations relying on SharePoint Server in on‑premises configurations.