HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🔍 ThreatIntel

Zero‑Day Spoofing Vulnerability (CVE‑2026‑32201) Exposes Over 1,300 Microsoft SharePoint Servers

A network‑spoofing zero‑day (CVE‑2026‑32201) affecting SharePoint 2016, 2019 and Subscription Edition is being abused on more than 1,300 publicly‑exposed servers. The flaw allows unauthenticated attackers to view and modify confidential data, prompting urgent remediation mandates for federal agencies and their supply‑chain partners.

🛡️ LiveThreat™ Intelligence · 📅 April 22, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Zero‑Day Spoofing Vulnerability (CVE‑2026‑32201) Exposes Over 1,300 Microsoft SharePoint Servers

What Happened – A network‑spoofing flaw (CVE‑2026‑32201) in SharePoint Enterprise Server 2016, SharePoint Server 2019 and SharePoint Server Subscription Edition was disclosed as a zero‑day and is already being abused. Over 1,300 publicly‑exposed SharePoint instances remain unpatched weeks after Microsoft’s April 2026 Patch Tuesday.

Why It Matters for TPRM

  • The vulnerability can be exploited without user interaction, giving attackers the ability to view and modify confidential data.
  • Federal agencies have been ordered to remediate within two weeks, highlighting regulatory pressure that can cascade to downstream vendors and partners.
  • Unpatched on‑premises SharePoint installations are common in many supply‑chain environments, creating a lateral‑movement foothold for threat actors.

Who Is Affected – Enterprises that host on‑premises SharePoint (finance, healthcare, government, manufacturing, etc.) and any third‑party service providers that rely on SharePoint for document collaboration.

Recommended Actions

  • Verify that all SharePoint servers under your contract have applied the April 2026 security update (CVE‑2026‑32201).
  • Conduct a rapid inventory of on‑premises SharePoint instances and enforce patch compliance.
  • Review BOD 22‑01 guidance and ensure any cloud‑hosted SharePoint services meet the same remediation timeline.

Technical Notes – The flaw is an improper input‑validation issue that enables network spoofing without privileged credentials. Exploitation impacts confidentiality and integrity but not availability. CVE‑2026‑32201 was added to the CISA KEV catalog and is being actively exploited. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/over-1-300-microsoft-sharepoint-servers-vulnerable-to-ongoing-attacks/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.