📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology CRITICAL 1h Global phishing Multiple Sectors HIGH 1h Global vulnerability Technology/Software HIGH 2h Global general Multiple sectors MEDIUM 4h Global phishing Telecommunications and Financial Services HIGH 4h Global data_breach Utilities and Critical Infrastructure HIGH 20h Global vulnerability Technology/Software MEDIUM 1d Global malware Multiple sectors (general) HIGH 1d Global apt Government CRITICAL 2d Global apt Critical Infrastructure / Nuclear Energy CRITICAL 2d Global vulnerability Information Technology CRITICAL 1h Global phishing Multiple Sectors HIGH 1h Global vulnerability Technology/Software HIGH 2h Global general Multiple sectors MEDIUM 4h Global phishing Telecommunications and Financial Services HIGH 4h Global data_breach Utilities and Critical Infrastructure HIGH 20h Global vulnerability Technology/Software MEDIUM 1d Global malware Multiple sectors (general) HIGH 1d Global apt Government CRITICAL 2d Global apt Critical Infrastructure / Nuclear Energy CRITICAL 2d Global vulnerability Information Technology CRITICAL 1h Global phishing Multiple Sectors HIGH 1h Global vulnerability Technology/Software HIGH 2h Global general Multiple sectors MEDIUM 4h Global phishing Telecommunications and Financial Services HIGH 4h Global data_breach Utilities and Critical Infrastructure HIGH 20h Global vulnerability Technology/Software MEDIUM 1d Global malware Multiple sectors (general) HIGH 1d Global apt Government CRITICAL 2d Global apt Critical Infrastructure / Nuclear Energy CRITICAL 2d
Vulnerabilities

CVE-2026-20963

High 🇺🇸 CISA KEV
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-502 — Weakness Type
Published: Jan 13, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

🤖 AI Executive Summary

CVE-2026-20963 is a critical deserialization vulnerability in Microsoft SharePoint Server affecting versions 2016, 2019, and subscription editions. An authorized attacker can execute arbitrary code remotely by sending specially crafted serialized objects. With a CVSS score of 8.8 and no public exploit currently available, immediate patching is essential for Saudi organizations relying on SharePoint for document management and collaboration.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 14:35
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi government entities (NCA, ARAMCO, Saudi Aramco subsidiaries), banking sector (SAMA-regulated institutions, major banks), healthcare organizations (MOH facilities), and large enterprises using SharePoint for sensitive document management. Government agencies managing classified or sensitive national documents are particularly at risk. The requirement for authorized access limits exposure but internal threats remain critical given the prevalence of SharePoint in Saudi enterprise environments.
🏢 Affected Saudi Sectors
Government Banking Healthcare Energy Telecommunications Education Large Enterprises
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all SharePoint Server instances (2016, 2019, subscription) in your environment
2. Restrict network access to SharePoint servers using firewall rules and network segmentation
3. Review access logs for suspicious deserialization activities or unusual object uploads
4. Disable unnecessary SharePoint features and web services

PATCHING GUIDANCE:
1. Apply Microsoft security patches immediately upon release for affected versions
2. Prioritize SharePoint 2016 and 2019 servers as they are out of mainstream support
3. For subscription editions, enable automatic updates if not already configured
4. Test patches in non-production environments before deployment

COMPENSATING CONTROLS:
1. Implement strict input validation and serialization filtering at application level
2. Deploy Web Application Firewall (WAF) rules to detect malicious serialized payloads
3. Monitor for CWE-502 exploitation patterns using SIEM/SOC tools
4. Enforce principle of least privilege for SharePoint service accounts
5. Implement network segmentation to isolate SharePoint from critical systems

DETECTION RULES:
1. Monitor for unusual .NET deserialization operations in SharePoint logs
2. Alert on suspicious ObjectDataProvider or WindowsIdentity serialization attempts
3. Track failed and successful authentication attempts to SharePoint APIs
4. Monitor for unexpected code execution from SharePoint application pools
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع خوادم SharePoint (2016، 2019، الإصدارات المشتركة) في بيئتك
2. تقييد الوصول إلى شبكة خوادم SharePoint باستخدام قواعد جدار الحماية والفصل الشبكي
3. مراجعة سجلات الوصول للأنشطة المريبة أو التحميلات غير العادية
4. تعطيل ميزات SharePoint والخدمات الويب غير الضرورية

إرشادات التصحيح:
1. تطبيق تصحيحات أمان Microsoft فوراً عند إصدارها للإصدارات المتأثرة
2. إعطاء الأولوية لخوادم SharePoint 2016 و2019 لأنها خارج الدعم الرئيسي
3. للإصدارات المشتركة، تفعيل التحديثات التلقائية إن لم تكن مفعلة
4. اختبار التصحيحات في بيئات غير الإنتاج قبل النشر

الضوابط البديلة:
1. تطبيق التحقق الصارم من المدخلات وتصفية التسلسل على مستوى التطبيق
2. نشر قواعد جدار تطبيقات الويب للكشف عن حمولات مسلسلة ضارة
3. مراقبة أنماط استغلال CWE-502 باستخدام أدوات SIEM/SOC
4. فرض مبدأ أقل صلاحية لحسابات خدمة SharePoint
5. تطبيق الفصل الشبكي لعزل SharePoint عن الأنظمة الحرجة

قواعد الكشف:
1. مراقبة عمليات فك التسلسل غير العادية في سجلات SharePoint
2. التنبيه على محاولات ObjectDataProvider أو WindowsIdentity المريبة
3. تتبع محاولات المصادقة الفاشلة والناجحة لواجهات برمجة تطبيقات SharePoint
4. مراقبة تنفيذ الكود غير المتوقع من مجموعات تطبيقات SharePoint
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information security policies and procedures A.8.1.1 - User access management A.12.2.1 - Change management procedures A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
ID.BE-1 - Business objectives and strategies PR.AC-1 - Access control policy and procedures PR.PT-1 - Security awareness and training DE.CM-8 - Vulnerability scans
🟡 ISO 27001:2022
A.6.1.2 - Information security roles and responsibilities A.8.1.1 - User registration and de-registration A.12.2.1 - Change management A.12.6.1 - Management of technical vulnerabilities and exposures
🟣 PCI DSS v4.0
6.2 - Security patches and updates 6.5.1 - Injection flaws 11.2 - Vulnerability scanning
📦 Affected Products / CPE 3 entries
microsoft:sharepoint_server
microsoft:sharepoint_server:2016
microsoft:sharepoint_server:2019
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-502
EPSS1.63%
Exploit No
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2026-03-21
Published 2026-01-13
Source Feed nvd
Views 4
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-502
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.