CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 22, 2026

1,370+ Microsoft SharePoint Servers Vulnerable to Spoofing Attacks Exposed Online

Cybersecurity News Archived Apr 22, 2026 ✓ Full text saved

A critical spoofing vulnerability in Microsoft SharePoint Server, tracked as CVE-2026-32201, remains unpatched on over 1,370 internet-facing IP addresses worldwide, according to fresh scanning data from the Shadowserver Foundation, even as the flaw sits on CISA’s Known Exploited Vulnerabilities (KEV) catalog with confirmed active exploitation in the wild. CVE-2026-32201 is rooted in improper input validation […] The post 1,370+ Microsoft SharePoint Servers Vulnerable to Spoofing Attacks Exposed

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security 1,370+ Microsoft SharePoint Servers Vulnerable to Spoofing Attacks Exposed Online A critical spoofing vulnerability in Microsoft SharePoint Server, tracked as CVE-2026-32201, remains unpatched on over 1,370 internet-facing IP addresses worldwide, according to fresh scanning data from the Shadowserver Foundation, even as the flaw sits on CISA’s Known Exploited Vulnerabilities (KEV) catalog with confirmed active exploitation in the wild. CVE-2026-32201 is rooted in improper input validation (CWE-20) within Microsoft Office SharePoint Server’s request processing component. By sending specially crafted network requests, an unauthenticated remote attacker can bypass authentication checks and perform spoofing attacks impersonating legitimate users to access or manipulate sensitive organizational data. Microsoft’s advisory confirms that successful exploitation can allow an attacker to view sensitive information and make changes to disclosed information, though availability is not directly impacted. The vulnerability carries a CVSS v3.1 base score of 6.5 (Medium severity), but security researchers warn that its real-world danger far exceeds its score. The attack vector is fully network-based (AV:N), requires low complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N) a dangerous combination for any internet-exposed enterprise collaboration platform. Microsoft SharePoint Servers Vulnerable Microsoft disclosed CVE-2026-32201 on April 14, 2026, as part of its April Patch Tuesday update cycle, which addressed a total of 169 vulnerabilities. The flaw affects on-premises SharePoint Server versions, including 2016, 2019, and Subscription Edition. CISA simultaneously added the vulnerability to its KEV catalog on April 14, citing confirmed evidence of active exploitation, and issued a federal remediation deadline of April 28, 2026. CISA’s rapid KEV listing moving in lockstep with Microsoft’s patch release signals the severity with which threat actors are actively targeting unpatched SharePoint infrastructure. This pattern mirrors the 2025 “ToolShell” exploitation campaign, in which hundreds of SharePoint customers were targeted via chained SharePoint vulnerabilities CVE-2025-49704 and CVE-2025-49706.cybersecuritydive+1 Shadowserver Foundation scanning data reveals 1,370 unpatched IP addresses still exposed to CVE-2026-32201 as of April 20, 2026, tracked under the http_vulnerable and http_vulnerable6 sources. The geographic breakdown of exposed systems is alarming: North America: 677 (largest share, with the United States accounting for 587 IPs) Europe: 452 Asia: 144 Oceania: 33 South America: 33 Africa: 31 The world map data confirms that the United States bears the highest concentration of vulnerable SharePoint deployments, with Canada contributing an additional 70 exposed IPs. European exposure is also significant, with clusters observed across Germany, France, and the UK. Despite its “Medium” CVSS rating, CVE-2026-32201 presents a severe risk for any organization running an internet-facing, on-premises SharePoint Server. The pre-authentication nature of the exploit means no credentials are needed any network-reachable SharePoint instance is a potential target. Exploitation can lead to credential theft, data exfiltration, unauthorized document access, and potential lateral movement into broader enterprise networks. Mitigations Organizations should take the following immediate steps: Apply Microsoft’s April 2026 Patch Tuesday security updates for all supported SharePoint Server versions (2016, 2019, Subscription Edition). Audit internet-facing SharePoint deployments and restrict public exposure where possible Monitor for anomalous authentication activity and spoofed session indicators Cross-reference CISA’s KEV catalog and prioritize CVE-2026-32201 remediation before the April 28 federal deadline. Use Shadowserver’s free scanning reports to identify vulnerable assets within your network perimeter. With over a thousand vulnerable systems still exposed more than a week after patch availability, organizations running on-premises SharePoint Server face an urgent window to remediate before threat actors escalate their exploitation campaigns. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News CrowdStrike LogScale Vulnerability Allows Remote Attackers to Read Arbitrary Files from Server Cyber Security News Microsoft-Signed Binary Used to Sneak LOTUSLITE Into India-Focused Espionage Campaign Cyber Security News Microsoft Emergency .NET 10.0.7 Update to Patch Elevation of Privilege Vulnerability Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 22, 2026
    Archived
    Apr 22, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗