Microsoft SharePoint RCE bug exploited to breach corporate network

Teilen:

A recently disclosed Microsoft SharePoint remote code execution (RCE) vulnerability tracked as CVE-2024-38094 is being exploited to gain initial access to corporate networks.

CVE-2024-38094 is a high-severity (CVSS v3.1 score: 7.2) RCE flaw impacting Microsoft SharePoint, a widely used web-based platform functioning as an intranet, document management, and collaboration tool that can seamlessly integrate with Microsoft 365 apps.

Microsoft fixed the vulnerability on July 9, 2024, as part of the July Patch Tuesday package, marking the issue as “important.”

Last week, CISA added CVE-2024-38094 to the Known Exploited Vulnerability Catalog but did not share how the flaw was exploited in attacks.

A new report from Rapid7 this week sheds light on how attackers exploit the SharePoint flaw, stating it was used in a network breach they were brought to investigate.

“Our investigation uncovered an attacker who accessed a server without authorization and moved laterally across the network, compromising the entire domain,” reads the related report.

“The attacker remained undetected for two weeks. Rapid7 determined the initial access vector to be the exploitation of a vulnerability, CVE 2024-38094, within the on-premise SharePoint server.”

Using AVs to impair security

Rapid7 now reports that attackers used CVE-2024-38094 to gain unauthorized access to a vulnerable SharePoint server and plant a webshell. The investigation showed that the server was exploited using a publicly disclosed SharePoint proof-of-concept exploit.

Leveraging their initial access, the attacker compromised a Microsoft Exchange service account with domain administrator privileges, gaining elevated access.

Next, the attacker installed the Horoung Antivirus, which created a conflict that disabled security defenses and impaired detection, allowing them to install Impacket for lateral movement.

Specifically, the attacker used a batch script (‘hrword install.bat’) to install Huorong Antivirus on the system, set up a custom service (‘sysdiag’), execute a driver (‘sysdiag_win10.sys’), and run ‘HRSword.exe’ using a VBS script.

This setup caused multiple conflicts in resource allocation, loaded drivers, and active services, causing the company’s legitimate antivirus services to crash being rendered powerless.

In the following stage, the attacker used Mimikatz for credential harvesting, FRP for remote access, and set up scheduled tasks for persistence.

To avoid detection, they disabled Windows Defender, altered event logs, and manipulated system logging on the compromised systems.

Additional tools such as everything.exe, Certify.exe, and kerbrute were used for network scanning, ADFS certificate generation, and brute-forcing Active Directory tickets.

Third-party backups were also targeted for destruction, but the attackers failed in their attempts to compromise those.

Although attempting to erase backups is typical in ransomware attacks, to prevent easy recovery, Rapid7 did not observe data encryption, so the type of the attack is unknown.

With active exploitation underway, system administrators who have not applied SharePoint updates since June 2024 must do so as soon as possible.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:11 pm, Juni 28, 2025
Wetter-Symbol 29°C
L: 27° | H: 29°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 55 %
Druck: 1024 mb
Wind: 11 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 30%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:45 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
27° | 29°°C 0 mm 0% 8 mph 60 % 1024 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 31°°C 0 mm 0% 7 mph 83 % 1025 mb 0 mm/h
Mo. Juni 30 10:00 pm
Wetter-Symbol
21° | 36°°C 1 mm 100% 8 mph 67 % 1021 mb 0 mm/h
Di. Juli 01 10:00 pm
Wetter-Symbol
21° | 32°°C 0.74 mm 74% 12 mph 73 % 1019 mb 0 mm/h
Mi. Juli 02 10:00 pm
Wetter-Symbol
17° | 25°°C 1 mm 100% 18 mph 85 % 1021 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
22° | 26°°C 0 mm 0% 8 mph 60 % 1024 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
20° | 23°°C 0 mm 0% 7 mph 69 % 1025 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 83 % 1025 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 75 % 1025 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
24° | 24°°C 0 mm 0% 5 mph 53 % 1025 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 6 mph 40 % 1024 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
31° | 31°°C 0 mm 0% 5 mph 33 % 1023 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 4 mph 33 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,724.12
0.57%
Ethereum(ETH)
€2,086.27
1.67%
Fesseln(USDT)
€0.85
0.00%
XRP(XRP)
€1.88
5.21%
Solana(SOL)
€129.84
7.52%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.140498
3.20%
Shiba Inu(SHIB)
€0.000009
2.85%
Pepe(PEPE)
€0.000009
4.56%
Nach oben scrollen