CVE-2026-20963: SharePoint Deserialization Flaw Now Under Active Exploitation

A critical deserialization vulnerability in on-premises Microsoft SharePoint Server, tracked as CVE-2026-20963, sat quietly in January's Patch Tuesday bundle for two months before CISA confirmed it was being actively exploited in the wild. Federal agencies were given just 72 hours to patch. CISA has not yet found evidence of ransomware exploitation specifically tied to CVE-2026-20963, but given the deserialization attack class's established appeal to both espionage operators and ransomware groups, the distinction may be temporary. Many organizations still haven't patched.

Vulnerability Fingerprint
Active Exploitation
Assigned by Microsoft on January 13, 2026 as part of the January Patch Tuesday security update cycle. The CVE record is maintained by MITRE and indexed in the National Vulnerability Database (NVD).
SharePoint reconstructs attacker-controlled serialized objects into live application objects without validating which types are instantiated. This is a systemic issue in SharePoint's legacy .NET codebase, particularly its use of the deprecated BinaryFormatter class.
Exploitable remotely over the network with no authentication required (per CISA and CCCS characterization). No user interaction needed. The attacker sends a crafted serialized payload via HTTP POST to a vulnerable SharePoint endpoint under /_layouts/.
Arbitrary code execution within the w3wp.exe SharePoint worker process, inheriting the permissions of the SharePoint service account. Enables full server compromise, web shell deployment, credential theft, and lateral movement into connected infrastructure.
CISA added CVE-2026-20963 to the Known Exploited Vulnerabilities catalog under Binding Operational Directive 22-01, confirming active exploitation in the wild. Federal civilian agencies were required to remediate by March 21, 2026 (72-hour deadline). The Canadian Centre for Cyber Security and CERT-EU corroborated the finding.
Security updates released as part of Patch Tuesday: KB5002822 (Subscription Edition, build 16.0.19127.20442), KB5002825 (Server 2019, build 16.0.5535.1001), KB5002828 (Server 2016, build 16.0.10417.20083). SharePoint security updates are cumulative; any subsequent update also includes this fix.
9.8 / 10.0
CVSS v3.1 Base Score
Critical
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Microsoft patched CVE-2026-20963 on January 13, 2026, and classified the likelihood of exploitation as "less likely." Two months later, CISA contradicted that assessment by adding the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on March 18, 2026. The Canadian Centre for Cyber Security confirmed it had also observed exploitation, issuing advisory AL26-005. CERT-EU published its own security advisory 2026-004, recommending that administrators rotate ASP.NET machine keys and enable AMSI in Full Mode as precautionary measures after patching. As of this writing, no specific threat actor has been publicly attributed, but the pattern is familiar: nation-state operators and ransomware groups have historically targeted SharePoint deserialization flaws with precision, and this one follows an exploit class they already know well.

What Is CVE-2026-20963

CVE-2026-20963 is a remote code execution vulnerability rooted in the deserialization of untrusted data, classified under CWE-502. It affects on-premises installations of Microsoft SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Enterprise Server 2016. SharePoint Online in Microsoft 365 is not affected.

The vulnerability allows an unauthenticated attacker to send a specially crafted serialized payload over the network to a vulnerable SharePoint endpoint. Microsoft's own advisory states that in a network-based attack, an unauthenticated attacker could inject and execute code remotely on the SharePoint Server. The Canadian Centre for Cyber Security, in its advisory AL26-005, characterized the flaw as one that could allow "an unauthenticated remote attacker to execute code." When SharePoint processes this payload, it reconstructs the data into live application objects without validating what types of objects are being instantiated. The result is arbitrary code execution within the context of the SharePoint worker process (w3wp.exe), which typically runs under a service account with broad permissions across the server and, often, adjacent infrastructure. In MITRE ATT&CK terms, this exploitation method maps directly to T1190: Exploit Public-Facing Application, where adversaries leverage a weakness in an internet-facing system to gain initial access to a network.

Active Exploitation Confirmed

CISA added CVE-2026-20963 to the KEV catalog on March 18, 2026, under Binding Operational Directive 22-01. Federal agencies were required to remediate by March 21. All organizations running on-premises SharePoint should treat this as an emergency patching priority.

CVSS scoring for this vulnerability varies across sources due to a fundamental disagreement about whether authentication is required. Microsoft's original advisory describes the attacker as "authorized" and assigns a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). However, CISA's KEV entry characterizes the vulnerability as enabling an "unauthorized attacker to execute code over a network," and SecurityWeek confirmed that Microsoft itself described the CVSS as 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) in the advisory. The Canadian Centre for Cyber Security aligned with the unauthenticated characterization, describing the flaw as one that could allow an unauthenticated remote attacker to execute code. The EPSS (Exploit Prediction Scoring System) currently rates CVE-2026-20963 at 7.10% probability of exploitation in the next 30 days, placing it in the 91st percentile—meaning it is assessed as more likely to be exploited than approximately 91% of all cataloged vulnerabilities. Regardless of which CVSS score an organization uses for internal prioritization, the confirmed active exploitation makes the risk level unambiguous.

How the Exploit Works

The vulnerability exists in how SharePoint handles serialized objects within its ASP.NET application pages, particularly those under the /_layouts/ directory. When SharePoint receives serialized input, it does not treat it as passive data. It rebuilds that input into live objects in memory and executes the associated logic as part of the deserialization process. Critically, there are no effective controls restricting which object types can be created or what behavior they trigger once reconstructed.

Attackers exploit this by crafting a serialized payload using .NET gadget chains—sequences of pre-existing framework classes that, when combined in a specific order during deserialization, result in code execution. The attacker base64-encodes the payload and embeds it into a parameter such as __VIEWSTATE within a POST request directed at a vulnerable endpoint.

Once the payload reaches the deserialization routine, SharePoint reconstructs the object graph without verifying the types involved. Internal methods execute automatically during reconstruction. The resulting code runs inside w3wp.exe, inheriting the permissions of the SharePoint service account. From there, the attacker can execute system commands, deploy web shells, alter configurations, or pivot laterally into connected systems. This post-exploitation behavior maps to several MITRE ATT&CK techniques: T1059.001: Command and Scripting Interpreter – PowerShell and T1059.003: Windows Command Shell for command execution, T1505.003: Server Software Component – Web Shell for establishing persistent access, and T1210: Exploitation of Remote Services for lateral movement into adjacent systems.

The Pivot Risk

SharePoint rarely operates in isolation. It typically connects to Active Directory, SQL Server databases, file shares, and other internal services. A compromised SharePoint server becomes a gateway into the broader enterprise environment, making lateral movement (T1210) a near-certainty in post-exploitation scenarios.

Attack Chain Walkthrough: CVE-2026-20963
1
2
3
4
5
6
Stage 1 — Initial Access
Target Identification and Payload Delivery
The attacker identifies an internet-facing SharePoint Server, often through Shodan, Censys, or targeted reconnaissance. They craft a malicious .NET serialized payload using gadget chains (pre-existing framework classes that trigger code execution when deserialized). This payload is base64-encoded and embedded into a POST request parameter such as __VIEWSTATE, targeting an endpoint under /_layouts/.
T1190: Exploit Public-Facing Application
Stage 2 — Execution
Deserialization Triggers Arbitrary Code
SharePoint's ASP.NET pipeline receives the request and feeds the serialized data to the .NET deserialization routine. Without type validation, the runtime reconstructs the attacker-controlled object graph. Internal methods execute automatically during object reconstruction. Arbitrary code now runs inside the w3wp.exe worker process under the SharePoint service account's permissions.
T1059.001: PowerShell T1059.003: Windows Command Shell
Stage 3 — Persistence
Web Shell Deployment
With code execution established, the attacker writes an ASPX web shell to the /_layouts/ directory or the SharePoint Web Server Extensions folder. This web shell provides a durable, HTTP-accessible backdoor that persists across IIS restarts and enables the attacker to return at will without re-exploiting the deserialization flaw. The shell typically accepts commands via GET/POST parameters and returns output in the HTTP response.
T1505.003: Web Shell
Stage 4 — Discovery and Credential Access
Environment Mapping
The attacker uses the compromised SharePoint server to enumerate the internal network: Active Directory domain structure, connected SQL databases, file shares, and trust relationships. Because the SharePoint service account often has elevated privileges across multiple systems, this phase yields a comprehensive map of high-value targets. Credential material (service account passwords, Kerberos tickets, cached credentials) is harvested from the server's memory and configuration stores.
T1087: Account Discovery T1003: OS Credential Dumping
Stage 5 — Lateral Movement
Pivoting into the Enterprise
With harvested credentials and a mapped network, the attacker moves laterally to domain controllers, database servers, and other critical infrastructure. SharePoint's typical connectivity to Active Directory and SQL Server makes it an ideal pivot point. The attacker may use SMB, WinRM, RDP, or DCOM to access additional systems, deploying additional backdoors and escalating privileges across the domain.
T1210: Exploitation of Remote Services T1021: Remote Services
Stage 6 — Impact
Data Exfiltration, Ransomware, or Espionage
The final stage depends on the attacker's objective. Nation-state operators typically exfiltrate sensitive documents, emails, and intellectual property from SharePoint's content databases. Ransomware operators encrypt file shares and databases, leveraging the SharePoint server's privileged network position for maximum blast radius. In either case, the organization faces catastrophic data exposure and operational disruption, all originating from a single unpatched deserialization flaw.
T1486: Data Encrypted for Impact T1567: Exfiltration Over Web Service
Analyst's Note

The attack chain above is not theoretical. Every stage maps to documented behavior from previous SharePoint exploitation campaigns, including the 2025 ToolShell incidents. The key insight is speed: in observed attacks against similar SharePoint deserialization flaws, the time from initial exploitation to web shell deployment has been measured in minutes, not hours. The window for detection between Stage 1 and Stage 3 is extremely narrow, which is why preventive patching is the only reliable defense.

The Two-Month Gap Between Patch and Exploitation

Microsoft released the patch for CVE-2026-20963 on January 13, 2026, as part of the standard Patch Tuesday cycle (KB5002822 for Subscription Edition). At the time, the advisory carried an exploitability assessment of "exploitation less likely," and the vulnerability received no special emphasis within the update bundle. According to SecurityWeek, the flaw was reported to Microsoft by an anonymous researcher.

For two months, the patch sat in release notes. Then, on March 18, CISA escalated the vulnerability to KEV status, confirming active exploitation and setting a remediation deadline of March 21—a 72-hour window under Binding Operational Directive 22-01. When Microsoft updated its own advisory on March 17, it still did not acknowledge in-the-wild exploitation, creating a disconnect between what CISA was observing and what Microsoft was officially communicating.

January 13, 2026
Patch Tuesday Release
Microsoft publishes KB5002822 (Subscription Edition), KB5002825 (2019), and KB5002828 (2016) as part of the standard monthly security update cycle. The advisory rates CVE-2026-20963 as "exploitation less likely." The vulnerability receives no special callout within a bundle containing dozens of other fixes. Most organizations that track Patch Tuesday prioritize based on Microsoft's own exploitability rating, and this one falls to the bottom of the queue.
January – March 2026
The Silent Window
For approximately 64 days, the patch exists but adoption remains low across organizations that deferred it based on the "less likely" assessment. During this window, unknown threat actors reverse-engineer the patch diff to identify the vulnerable code path and develop a working exploit. This pattern of post-patch exploit development is well-documented and typically takes days to weeks for skilled operators, not months. The question is not whether exploitation began during this window, but how early.
March 17, 2026
Microsoft Advisory Update
Microsoft updates the CVE-2026-20963 advisory. According to CERT-EU's advisory, this update specifically raised the CVSS score and changed the FAQ section to indicate that the vulnerability could be exploited by an unauthenticated attacker—a significant shift from the original "authorized attacker" language. However, Microsoft still did not change the exploitability assessment to acknowledge active exploitation. BleepingComputer reported that even after CISA's KEV listing the following day, Microsoft had still not flagged the vulnerability as exploited in the wild. Organizations monitoring Microsoft's advisory as their primary signal receive no indication that urgency has changed.
March 18, 2026
CISA KEV Listing — Active Exploitation Confirmed
CISA adds CVE-2026-20963 to the Known Exploited Vulnerabilities catalog under Binding Operational Directive 22-01, confirming active exploitation in the wild. The Canadian Centre for Cyber Security corroborates the finding. Federal civilian agencies receive a remediation deadline of March 21 — just 72 hours. For organizations that deferred the January patch, the risk calculus changes overnight from "low priority" to "emergency."
March 21, 2026
BOD 22-01 Remediation Deadline
Federal agencies are required to have completed remediation by this date. For organizations running SharePoint Server in complex environments, 72 hours is often insufficient for the full update lifecycle: downloading, testing, deploying, running PSConfig, and validating functionality. Many agencies likely implement compensating controls (WAF rules, network isolation) while working toward full patching. Non-federal organizations, while not bound by BOD 22-01, face the same exploitation risk.

This gap raises difficult questions. Were threat actors quietly exploiting the flaw for weeks or months before CISA detected it? Did organizations deprioritize the patch because Microsoft's own risk assessment underestimated the threat? SharePoint updates are notoriously disruptive—they often require downtime, configuration wizard runs, and coordination across teams—which means many organizations defer them unless there is a clear and present danger signal. In this case, that signal came two months late. NIST SP 800-40 Rev. 4, Guide to Enterprise Patch Management Planning, directly addresses this pattern by framing patching as preventive maintenance rather than an optional activity—a cost of doing business that organizations cannot afford to delay when actively exploited vulnerabilities are at stake.

Affected Versions and Patch Details

The following on-premises SharePoint Server versions are affected by CVE-2026-20963:

Affected — Patch Required
SharePoint Subscription Edition
January 13, 2026 — Fixed in build 16.0.19127.20442
KB5002822
Affected — Patch Required
SharePoint Server 2019
January 13, 2026 — Fixed in build 16.0.5535.1001
KB5002825
Affected — Patch Required
SharePoint Enterprise Server 2016
January 13, 2026 — Fixed in build 16.0.10417.20083
KB5002828
Not Affected
SharePoint Online (Microsoft 365)
Cloud-managed, auto-patched

To verify whether your environment is patched, run Get-SPProduct on each SharePoint server and check the build number against the fixed versions listed above. Any build number below the fixed version for your edition remains vulnerable.

All patches are available through Microsoft Update, the Microsoft Update Catalog, and the Microsoft Download Center. SharePoint security updates are cumulative, so organizations applying the latest available update will also receive the CVE-2026-20963 fix. Note that for Subscription Edition customers currently on the January 2026 update, upgrading directly to the March 2026 update (KB5002843) requires first installing the February 2026 update (KB5002833) and running the SharePoint Products Configuration Wizard (PSConfig) between each step.

March 2026 Brought Three More SharePoint RCE Flaws

CERT-EU's advisory 2026-004 noted that three additional remote code execution vulnerabilities in SharePoint were patched in the March 10, 2026 Patch Tuesday release: CVE-2026-26106 (improper input validation, CVSS 8.8), CVE-2026-26113 (type confusion, critical), and CVE-2026-26114 (deserialization of untrusted data, CVSS 8.8). CVE-2026-26114 is another CWE-502 deserialization flaw in the same class as CVE-2026-20963. Organizations that have only applied the January update and not the March update remain exposed to these additional vulnerabilities. The March 2026 cumulative updates (KB5002843 for Subscription Edition, KB5002850 for SharePoint 2016) address all four vulnerabilities. This clustering of SharePoint RCE flaws across consecutive months reinforces the urgency of staying current on patches, not just remediating individual CVEs.

SharePoint Online in Microsoft 365 is not affected. This vulnerability is exclusive to self-managed, on-premises deployments, including those running in cloud IaaS environments like Azure, AWS, or GCP.

SharePoint's Recurring Deserialization Problem

CVE-2026-20963 is not an isolated incident. It is the latest in a pattern of insecure deserialization vulnerabilities that have plagued SharePoint Server for years. The 2025 ToolShell campaign alone produced four CVEs across two rounds of patching: CVE-2025-49704 and CVE-2025-49706 (the original exploit chain, patched July 8, 2025), followed by CVE-2025-53770 and CVE-2025-53771 (bypass variants that emerged within days, requiring emergency out-of-band patches on July 19–22, 2025). All four were added to CISA's KEV catalog. Microsoft confirmed that Chinese nation-state actors and a ransomware operator actively exploited the ToolShell chain to deploy web shells, steal cryptographic MachineKeys, and move laterally across enterprise networks.

Threat Actors Who Exploited SharePoint ToolShell (2025)

Microsoft attributed the ToolShell exploitation campaign to three China-linked threat actors. MITRE tracks this activity as Campaign C0058: SharePoint ToolShell Exploitation. Understanding their operational profiles is critical context for assessing CVE-2026-20963 risk, because these same groups have the capability and motivation to pivot to new SharePoint deserialization flaws as they emerge.

  • Linen Typhoon (also tracked as APT27 / Emissary Panda / TG-3390) — A long-running Chinese state-sponsored espionage group active since at least 2010. Exploited ToolShell to steal MachineKeys and establish persistent access on SharePoint servers. Two APT27 operators were indicted by the US DOJ in March 2025. Full APT27 profile on NoHacky.
  • Violet Typhoon (also tracked as APT31 / ZIRCONIUM / Judgment Panda) — A Chinese state-sponsored espionage group specializing in intelligence collection against government, defense, and critical infrastructure targets across multiple continents. Full profile on NoHacky.
  • Storm-2603 — A China-based threat actor that deployed Warlock ransomware via the ToolShell chain, using GPO abuse and PsExec for lateral movement. This actor blurred the line between espionage and financially motivated operations. Full profile on NoHacky.

The root cause is systemic. SharePoint is built on a legacy .NET codebase that relies on binary serialization for handling state data, including the BinaryFormatter class that Microsoft itself has publicly deprecated and warns against using. Microsoft deprecated BinaryFormatter in .NET 9, where it now throws exceptions on use. But SharePoint's architecture predates that decision by many years, and removing the dependency would require rewriting core serialization logic that thousands of enterprise deployments depend on.

This creates an ongoing cycle: Microsoft patches one deserialization entry point, researchers or attackers discover another, and the underlying attack surface persists. The ToolShell vulnerabilities from July 2025 demonstrated this clearly—the initial patches for CVE-2025-49704 and CVE-2025-49706 were bypassed within a week, leading to CVE-2025-53770 and CVE-2025-53771. CVE-2026-20963 targets the same fundamental weakness through a different code path, and there is no reason to believe it will be the last.

Analyst's Note

There is a systemic tension worth naming here. Microsoft has publicly deprecated BinaryFormatter and warns developers not to use it. Yet SharePoint — one of Microsoft's own flagship enterprise products — continues to depend on it. The reason is architectural inertia: removing BinaryFormatter from SharePoint would require rewriting fundamental state management logic that thousands of enterprise deployments rely on, a change that would itself carry significant regression risk. The result is a product that cannot adopt the vendor's own security guidance. This is the same class of technical debt that makes legacy software dangerous in any organization, and the fact that it exists within Microsoft's own codebase makes it a particularly instructive case study in why end-of-life planning cannot be deferred.

Detection and Threat Hunting Guidance

Detecting exploitation of CVE-2026-20963 is challenging because the malicious payload is processed as legitimate application data. Signature-based detection alone is insufficient. Organizations should adopt a layered approach that combines application-level monitoring, endpoint telemetry, and network analysis. NIST SP 800-92, Guide to Computer Security Log Management, provides foundational guidance on establishing the log collection and analysis infrastructure necessary to support this type of threat hunting.

No Public IOCs Have Been Released

As of this writing, neither CISA nor Microsoft have published indicators of compromise or detailed exploitation telemetry for CVE-2026-20963. Beazley Security noted that no threat actor attribution has been publicly disclosed and recommended defenders watch for web shell files with .aspx, .ashx, or .asmx extensions appearing in SharePoint web directories. This IOC gap means organizations cannot rely on signature-based detection and must instead focus on behavioral indicators. The detection priorities below are based on post-exploitation patterns observed in previous SharePoint deserialization campaigns, including the 2025 ToolShell incidents where CISA eventually released a formal Malware Analysis Report (MAR-251132) covering six exploitation-related files.

Detection Priority Matrix
P1
Process Chain Monitoring
Watch w3wp.exe for spawning cmd.exe, powershell.exe, or certutil.exe
Enable Windows Event ID 4688 (Process Creation) with command-line auditing on all SharePoint servers. Correlate parent process w3wp.exe with child processes cmd.exe, powershell.exe, or certutil.exe. This is the highest-fidelity signal for post-deserialization code execution and the single most effective detection rule for this vulnerability class.
T1059.001 PowerShell T1059.003 Cmd Shell Event ID 4688
P1
Web Shell File Scan
Scan /_layouts/ and WebServerExtensions for new .aspx files
Perform a baseline inventory of all .aspx files in SharePoint's /_layouts/ directory tree and the Web Server Extensions folder. Compare against a known-good snapshot taken before January 2026. Any new file created outside of a documented update cycle is a strong indicator of web shell deployment and warrants immediate forensic analysis.
T1505.003 Web Shell File Integrity
P2
HTTP Request Inspection
Inspect POST requests to /_layouts/ for anomalous serialized payloads
Configure IIS or WAF logging to capture full request bodies (or at minimum, parameter values exceeding normal lengths) for requests to /_layouts/ endpoints. Look for unusual base64-encoded data in __VIEWSTATE or other form parameters. Known .NET gadget chain patterns can be matched using YARA rules or custom WAF signatures. Detection fidelity depends on the WAF's ability to inspect POST bodies.
T1190 Exploit Public App WAF / IIS Logs
P2
SharePoint ULS Log Correlation
Correlate ULS errors with authentication and process events
SharePoint's Unified Logging Service generates detailed diagnostic entries that can reveal deserialization failures and exceptions. Cross-reference ULS error entries timestamped near suspicious Event ID 4688 entries and anomalous IIS log activity. Cluster analysis on failed serialization operations can surface exploitation attempts even when they do not succeed.
SP 800-92 ULS Logs
P3
Lateral Movement Indicators
Monitor for outbound SMB, WinRM, and RDP from SharePoint servers
If a SharePoint server initiates outbound connections to other internal systems over SMB (445), WinRM (5985/5986), or RDP (3389), this is a strong anomaly. SharePoint servers should rarely, if ever, initiate these types of connections. Create network flow alerts for any outbound traffic from SharePoint servers to internal hosts on these ports.
T1210 Remote Services T1021 Remote Services Network Flow

At the application layer, security teams should inspect incoming HTTP requests to SharePoint endpoints under /_layouts/ for anomalies in serialized data. This includes unusually structured payloads, unexpected parameter formats in __VIEWSTATE or similar fields, and request patterns that align with known .NET gadget chain structures.

On the endpoint, monitor the SharePoint worker process (w3wp.exe) for suspicious child process creation, particularly spawning cmd.exe or powershell.exe. This behavior maps to T1059.001: PowerShell and T1059.003: Windows Command Shell. Enable Windows Event ID 4688 (process creation) on all SharePoint servers and correlate with SharePoint Unified Logging Service (ULS) entries.

# Hunt for suspicious process chains from SharePoint worker process
# Windows Event ID 4688 - Process Creation
# Look for w3wp.exe spawning cmd.exe, powershell.exe, or certutil.exe

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4688} |
  Where-Object { $_.Properties[13].Value -match 'w3wp\.exe' -and
    $_.Properties[5].Value -match '(cmd|powershell|certutil)\.exe' } |
  Select-Object TimeCreated, @{N='ParentProcess';E={$_.Properties[13].Value}},
    @{N='NewProcess';E={$_.Properties[5].Value}}

Additionally, scan the /_layouts/ directory tree and the SharePoint Web Server Extensions folder for recently created .aspx files that may indicate web shell deployment (T1505.003: Web Shell). Any new file appearing in these directories outside of a known update cycle warrants immediate investigation.

Mitigation Steps

The single highest-impact action is applying the January 2026 security updates. Organizations that have already applied subsequent cumulative updates (February or March 2026) are also protected, as SharePoint security updates are cumulative. This aligns with the flaw remediation requirements in NIST SP 800-53 Rev. 5, specifically control SI-2 (Flaw Remediation), which requires organizations to identify, report, and correct system flaws and install security-relevant updates within organization-defined time periods, and control RA-5 (Vulnerability Monitoring and Scanning), which mandates continuous scanning and remediation based on risk.

For environments where immediate patching is not feasible, the following interim measures can reduce exposure. These are not generic suggestions—each one targets a specific link in the CVE-2026-20963 exploitation chain.

  1. Block deserialization payloads at the WAF layer: Generic WAF rules are not enough. Configure your Web Application Firewall to specifically inspect POST request bodies targeting SharePoint endpoints (particularly /_vti_bin/client.svc, /_api/, and /_layouts/ paths) for known .NET gadget chain signatures. Look for base64-encoded payloads containing indicators of ObjectDataProvider, TypeConfuseDelegate, ActivitySurrogateSelector, and BinaryFormatter class references. If your WAF supports custom rules, write pattern-matching rules that flag unusually large or structurally anomalous serialized objects in HTTP request bodies. Rate-limit POST requests to these endpoints as an additional friction layer.
  2. Enable AMSI integration with full HTTP body scanning: Configure the Antimalware Scan Interface in SharePoint and deploy Microsoft Defender Antivirus (or an equivalent endpoint protection solution) on all SharePoint servers. Critically, if HTTP Request Body scanning is available, enable Full Mode—not the default partial mode. CERT-EU's advisory for CVE-2026-20963 specifically recommends enabling AMSI in Full Mode and rotating ASP.NET machine keys as precautionary measures after patching. AMSI gives the endpoint protection engine visibility into the serialized payloads before the deserialization routine processes them, which is the last opportunity to intercept a gadget chain before it executes. If AMSI cannot be enabled immediately, rotate your MachineKeys and restart IIS (iisreset) after installing the security update to invalidate any cryptographic material an attacker may have already harvested.
  3. Enforce MFA on all SharePoint authentication paths: Because exploitation requires at least low-privilege authenticated access, multi-factor authentication is one of the most effective controls for breaking the attack chain at its earliest stage. Require MFA for all SharePoint access—internal and remote—and extend it to service accounts and privileged identities where possible. A single compromised credential obtained through phishing is often sufficient to deliver a deserialization payload. MFA does not prevent the vulnerability from being exploitable, but it raises the barrier from "anyone with a stolen password" to "anyone with a stolen password and a compromised second factor," which eliminates the vast majority of commodity attack scenarios.
  4. Replace VPN-based SharePoint access with Zero Trust Network Access: Traditional VPNs grant authenticated users broad network-level access, which means a compromised credential provides not just a path to the deserialization endpoint but lateral movement capability across the entire network. ZTNA solutions (Microsoft Entra Private Access, Cloudflare Access, Zscaler Private Access, or equivalent) enforce per-application access policies that route users only to the specific SharePoint resources they need, without exposing the underlying network. This eliminates the VPN's implicit trust model and ensures that even a successfully authenticated attacker cannot pivot to adjacent infrastructure. For organizations that cannot deploy ZTNA immediately, place SharePoint behind a reverse proxy that restricts access by source IP, device posture, and user identity.
  5. Harden IIS and lock down the LAYOUTS directory: Restrict write permissions on the /_layouts/ directory and the Web Server Extensions folder (C:\Program Files\Common Files\microsoft shared\Web Server Extensions\) to only the service accounts that absolutely require them. This limits the ability of post-exploitation web shells (T1505.003) to persist on disk. Use IIS URL Rewrite rules to block direct access to non-essential SharePoint endpoints that process serialized input. Disable any web parts, APIs, or features that your organization does not actively use—each enabled endpoint is a potential deserialization surface. Review the SharePoint application pool identity permissions with Get-SPServiceApplicationPool | Select-Object Name, ProcessAccountName and ensure the service account follows least-privilege principles.
  6. Segment the network with microsegmentation, not just VLANs: Place SharePoint servers in a dedicated network segment with explicit firewall rules that deny all east-west traffic to Domain Controllers, SQL databases, file shares, and other high-value assets by default. Then allow only the specific ports and protocols SharePoint requires to function. Traditional VLAN segmentation is insufficient because flat rules within a VLAN still permit lateral movement. Microsegmentation tools (host-based firewalls, identity-aware segmentation platforms) can enforce per-process network policies, so that even if w3wp.exe is compromised, it cannot reach infrastructure that SharePoint does not legitimately communicate with. Restrict outbound internet access from SharePoint servers to only the update and management endpoints required for patching and telemetry—this blocks command-and-control callbacks that attackers rely on for post-exploitation staging. NIST SP 800-123, Guide to General Server Security, provides baseline guidance on network segmentation for server environments.
  7. Audit credentials and eliminate dormant access: Review and remove unnecessary user accounts with SharePoint access. Since exploitation requires only low-privilege authenticated access, every valid credential is a potential entry point. Audit service accounts for excessive permissions, disable accounts that have not authenticated in 90 days, and remove any lingering test or developer accounts from production. Rotate passwords for all SharePoint-related service accounts, particularly the farm account and application pool identities, as a precautionary measure if you suspect any prior compromise. Pay special attention to accounts with Site Collection Administrator or Full Control web application policies—these represent the highest-risk credentials in a deserialization scenario.
  8. Deploy EDR with SharePoint-specific behavioral rules: Ensure endpoint detection and response tooling is active on all SharePoint servers with rules specifically targeting the CVE-2026-20963 exploitation chain: w3wp.exe spawning child processes such as cmd.exe, powershell.exe, or certutil.exe (T1059.001); new .aspx files created in /_layouts/ or Web Server Extensions directories after the January 2026 patch date; encoded PowerShell execution from the IIS worker process context; and outbound network connections from w3wp.exe to external IP addresses. Run EDR in block mode where possible—alert-only configurations detect exploitation after the fact, but block mode can terminate the gadget chain execution before lateral movement begins. Microsoft Defender for Endpoint's Attack Surface Reduction rules provide additional coverage: enable rules that block credential theft from LSASS, block process creation from PSExec and WMI commands, and use advanced protection against ransomware.
  9. Conduct a retroactive compromise assessment: Because the patch was available for two months before CISA confirmed active exploitation, organizations should not assume they are clean simply because they have now patched. Review IIS logs for suspicious POST requests containing unusually large payloads or encoded content targeting /_vti_bin/, /_api/, and /_layouts/ endpoints dating back to at least January 2026. Scan the /_layouts/ directory and Web Server Extensions folders for unexpected .aspx files created after January 13, 2026. Check Windows Event ID 4688 (Process Creation) logs for any instances of w3wp.exe spawning command interpreters. If any indicators of compromise are found, treat the SharePoint server as fully compromised: isolate it, rotate all associated credentials (including the farm account and MachineKeys), and initiate your incident response plan.

How to Remediate CVE-2026-20963 on SharePoint Server

The following step-by-step process covers the complete remediation workflow for CVE-2026-20963, from patch verification through post-patch hardening. Follow these steps in order on every on-premises SharePoint Server in your environment.

  1. Identify all on-premises SharePoint servers
    Run Get-SPServer | Where-Object {$_.Role -ne "Invalid"} in the SharePoint Management Shell to enumerate every server in the farm. Document the SharePoint version (Subscription Edition, 2019, or 2016) running on each server. Include servers in cloud IaaS environments (Azure, AWS, GCP) that host self-managed SharePoint.
  2. Verify current patch level on each server
    Run Get-SPProduct on each server and compare the build number against the fixed versions: 16.0.19127.20442 (Subscription Edition), 16.0.5535.1001 (Server 2019), or 16.0.10417.20083 (Server 2016). Any build number below these values is vulnerable to CVE-2026-20963.
  3. Download and install the security update
    Obtain the correct KB update for your version: KB5002822 (Subscription Edition), KB5002825 (Server 2019), or KB5002828 (Server 2016) from Microsoft Update, the Microsoft Update Catalog, or the Microsoft Download Center. If applying the March 2026 cumulative update instead, install February's update first and run PSConfig between each step.
  4. Run the SharePoint Products Configuration Wizard
    After installing the update on every server in the farm, run PSConfig (SharePoint Products Configuration Wizard) on each server, starting with the server hosting Central Administration. This step is required to complete the patching process. Failure to run PSConfig leaves the farm in a partially patched state.
  5. Enable AMSI in Full Mode
    Navigate to Central Administration, then General Application Settings, then Configure Antimalware Scan Interface, and set AMSI to Full Mode. This gives endpoint protection visibility into serialized payloads before deserialization. Deploy Microsoft Defender Antivirus or an equivalent on all SharePoint servers if not already present.
  6. Rotate ASP.NET machine keys and restart IIS
    Follow Microsoft's machine key management guidance to rotate the ASP.NET MachineKeys on each server. Then restart IIS by running iisreset.exe. This invalidates any cryptographic material that an attacker may have harvested during the two-month exposure window.
  7. Conduct a retroactive compromise assessment
    Scan the /_layouts/ directory and Web Server Extensions folders for unexpected .aspx, .ashx, or .asmx files created after January 13, 2026. Review Windows Event ID 4688 logs for w3wp.exe spawning cmd.exe, powershell.exe, or certutil.exe. Inspect IIS logs for anomalous POST requests to /_layouts/, /_api/, and /_vti_bin/ endpoints. If any indicators are found, isolate the server, rotate all credentials, and initiate incident response.
  8. Verify remediation and document
    Re-run Get-SPProduct to confirm the patched build number on every server. Run a vulnerability scan against all SharePoint endpoints to validate CVE-2026-20963 is no longer detected. Document the remediation date, build numbers, and any findings from the compromise assessment for audit and compliance records.
Exposure Self-Assessment: Is Your Environment at Risk?
Check each item your organization has completed. Be honest — this is for your own situational awareness.
We have applied the January 2026 security update (or a subsequent cumulative update) to all on-premises SharePoint Server instances.
We have confirmed patch installation via Get-SPProduct or equivalent verification on every SharePoint server in our environment.
Our SharePoint servers are segmented from critical internal infrastructure (Domain Controllers, SQL databases, file shares) with firewall rules restricting lateral traffic.
Windows Event ID 4688 (Process Creation) auditing is enabled on all SharePoint servers with logs forwarded to a SIEM.
We actively monitor w3wp.exe for suspicious child process creation (cmd.exe, powershell.exe, certutil.exe).
We have scanned the /_layouts/ directory and Web Server Extensions folder for unexpected .aspx files created after January 2026.
A Web Application Firewall (WAF) sits in front of any internet-facing SharePoint endpoints, configured to inspect POST request bodies.
We have a documented migration plan to exit SharePoint Server 2016/2019 before the July 14, 2026 end-of-support date.
Completed: 0 / 8
Analyst's Note

If your organization cannot check the first item on this list, everything else is secondary. Compensating controls reduce exposure; they do not eliminate it. The only definitive remediation for CVE-2026-20963 is applying the patch. Every day an unpatched SharePoint server remains accessible is a day the exploit window remains open. The self-assessment above maps directly to controls in NIST SP 800-53 Rev. 5 — specifically SI-2 (Flaw Remediation), RA-5 (Vulnerability Scanning), SC-7 (Boundary Protection), and AU-6 (Audit Record Review).

The Bigger Picture: End of Life Is Four Months Away

SharePoint Server 2016 & 2019 End of Support
--
Days
--
Hours
--
Minutes
After July 14, 2026, Microsoft stops releasing security updates for SharePoint Server 2016 and 2019. Any vulnerability discovered after this date remains permanently unpatched.

SharePoint Server 2016 and SharePoint Server 2019 reach end of support on July 14, 2026. After that date, Microsoft will stop releasing security updates for these versions entirely. Any new vulnerability discovered after July in either version will remain permanently unpatched.

This creates a strategic inflection point for organizations still running on-premises SharePoint. CVE-2026-20963 is a manageable problem today because a patch exists. The next deserialization flaw discovered in SharePoint 2016 or 2019 after end of support will not have that option. Organizations running these versions need to be planning their migration path now—whether to SharePoint Subscription Edition, SharePoint Online, or an alternative platform—because the window for supported, patched on-premises operations is closing rapidly. NIST SP 800-40 Rev. 4 explicitly addresses this scenario in its guidance on unpatchable assets, recommending that organizations plan for end-of-life transitions as part of their overall patch management strategy rather than accepting the cumulative risk of running unsupported software.

The broader reality is that on-premises SharePoint carries an inherent patching liability that cloud-hosted alternatives do not. SharePoint Online receives automatic security updates from Microsoft with no downtime, no PSConfig wizards, and no emergency 72-hour deadlines. Every month that an organization defers migrating is another month of exposure to the next vulnerability in a codebase that has proven, repeatedly, that its deserialization attack surface is far from fully resolved.

Knowledge Check

Test Your Understanding of CVE-2026-20963
Question 1 of 5
What is the root vulnerability class behind CVE-2026-20963?
CVE-2026-20963 is a CWE-502 deserialization vulnerability. SharePoint reconstructs attacker-controlled serialized objects into live application objects without validating which types are instantiated. This is a systemic issue in SharePoint's legacy .NET codebase, particularly its use of the deprecated BinaryFormatter class.
Question 2 of 5
How long was the gap between Microsoft's patch release and CISA's confirmation of active exploitation?
Microsoft released the patch on January 13, 2026, and CISA added CVE-2026-20963 to the KEV catalog on March 18, 2026 — a gap of approximately 64 days. During that window, many organizations deprioritized the patch because Microsoft rated it "exploitation less likely." This delay pattern is a recurring problem in enterprise patch management, which NIST SP 800-40 Rev. 4 directly addresses.
Question 3 of 5
Which MITRE ATT&CK technique describes the initial exploitation of the SharePoint vulnerability?
T1190 (Exploit Public-Facing Application) covers the initial access phase where an attacker exploits a vulnerability in an internet-facing application. The other techniques listed represent later stages of the attack chain: T1059.001 covers post-exploitation command execution, T1505.003 covers persistence via web shells, and T1210 covers lateral movement to other internal systems.
Question 4 of 5
Why does monitoring w3wp.exe matter for detecting CVE-2026-20963 exploitation?
w3wp.exe is the IIS worker process that hosts the SharePoint application pool. When a deserialization payload executes, the resulting code runs inside this legitimate process. The detection signal is not the process itself (which is always running on SharePoint servers), but whether it spawns unexpected child processes like cmd.exe, powershell.exe, or certutil.exe — mapped to T1059.001 and T1059.003 in ATT&CK.
Question 5 of 5
What happens to SharePoint Server 2016 and 2019 after July 14, 2026?
Both SharePoint Server 2016 and 2019 reach end of support on July 14, 2026. After that date, Microsoft will release no further security updates for either version. Any deserialization vulnerability (or any other vulnerability class) discovered after that date in these products will remain permanently unpatched. NIST SP 800-40 Rev. 4 classifies these as "unpatchable assets" that require migration planning, not acceptance of risk.
0 / 5

Frequently Asked Questions

CVE-2026-20963 is a critical deserialization of untrusted data vulnerability in on-premises Microsoft SharePoint Server. It allows an unauthenticated attacker to execute arbitrary code remotely over a network by sending a specially crafted serialized payload to a vulnerable SharePoint endpoint.
CVE-2026-20963 affects Microsoft SharePoint Server Subscription Edition, Microsoft SharePoint Server 2019, and Microsoft SharePoint Enterprise Server 2016. SharePoint Online in Microsoft 365 is not affected.
Yes. CISA added CVE-2026-20963 to its Known Exploited Vulnerabilities catalog on March 18, 2026, confirming active exploitation in the wild. No specific threat actor has been publicly attributed to the attacks.
Microsoft released security updates addressing CVE-2026-20963 as part of the January 13, 2026 Patch Tuesday. Affected versions should apply the relevant KB updates: KB5002822 for SharePoint Subscription Edition, KB5002825 for SharePoint Server 2019, and KB5002828 for SharePoint Enterprise Server 2016.
CVE-2026-20963 is a separate vulnerability from the ToolShell exploit chain (CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771), but it shares the same root cause: insecure deserialization in .NET-based SharePoint components. Microsoft attributed ToolShell exploitation to Chinese nation-state actors Linen Typhoon, Violet Typhoon, and ransomware operator Storm-2603. This recurring vulnerability class highlights a systemic challenge in the SharePoint codebase.
CVE-2026-20963 has two reported CVSS v3.1 scores due to a disagreement about whether authentication is required. Microsoft originally assigned 8.8 based on authenticated access, but CISA and the Canadian Centre for Cyber Security characterize it as unauthenticated, yielding a score of 9.8. CERT-EU confirmed that Microsoft raised the CVSS score on March 17, 2026 and updated the advisory to indicate unauthenticated exploitation. The EPSS score is 7.10%, placing it in the 91st percentile.
Run Get-SPProduct in the SharePoint Management Shell and compare the build number against the fixed versions: 16.0.19127.20442 for Subscription Edition, 16.0.5535.1001 for Server 2019, or 16.0.10417.20083 for Server 2016. Any build number below these values remains vulnerable. SharePoint security updates are cumulative, so any update from January 2026 or later includes the fix.
No. CVE-2026-20963 only affects on-premises SharePoint Server installations, including SharePoint Subscription Edition, Server 2019, and Enterprise Server 2016. SharePoint Online in Microsoft 365 is cloud-managed and auto-patched by Microsoft and is not affected. However, self-managed SharePoint running in cloud IaaS environments like Azure, AWS, or GCP is affected.

Organizations running on-premises SharePoint in any version should treat CVE-2026-20963 as an immediate patching priority. The confirmed exploitation, the low barrier to entry for attackers, and the high-value data typically stored in SharePoint environments make this a vulnerability that cannot wait for the next maintenance window.