INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 58m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 58m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 58m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h
Vulnerabilities

CVE-2023-29357

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft SharePoint Server Privilege Escalation Vulnerability — Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spo
Published: Jan 10, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft SharePoint Server Privilege Escalation Vulnerability — Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.

🤖 AI Executive Summary

CVE-2023-29357 is a critical privilege escalation vulnerability in Microsoft SharePoint Server (CVSS 9.0) that allows unauthenticated attackers with spoofed JWT tokens to bypass authentication and gain administrator privileges. With public exploits available, this poses an immediate threat to organizations using SharePoint for document management and collaboration. Immediate patching is essential as the vulnerability enables complete compromise of SharePoint infrastructure and sensitive data access.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 03:32
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses critical risk to Saudi government entities (NCA, CITC), SAMA-regulated financial institutions, and major enterprises using SharePoint for sensitive document management. Saudi banks and financial services firms are particularly vulnerable as they rely heavily on SharePoint for internal collaboration and document control. Government agencies managing classified information and healthcare organizations storing patient records face severe data breach risks. Energy sector organizations (ARAMCO, utilities) and telecommunications providers (STC, Mobily) using SharePoint for operational data are also at high risk of complete infrastructure compromise.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare and Medical Services Energy and Utilities Telecommunications Education Large Enterprises
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Apply Microsoft security patches immediately to all SharePoint Server instances (2019, 2016, 2013 versions as applicable)
2. Disable SharePoint services temporarily if patching cannot be completed within 24 hours
3. Implement network segmentation to restrict SharePoint access to authorized networks only
4. Revoke and regenerate all JWT tokens and authentication credentials
5. Force re-authentication for all active SharePoint sessions

PATCHING GUIDANCE:
- Download latest cumulative updates from Microsoft Security Updates
- Test patches in non-production environment first
- Schedule maintenance windows for production deployment
- Verify patch installation with Microsoft's verification tools

COMPENSATING CONTROLS (if immediate patching delayed):
- Implement Web Application Firewall (WAF) rules to block suspicious JWT patterns
- Enable enhanced logging for all SharePoint authentication attempts
- Deploy intrusion detection signatures for CVE-2023-29357 exploitation attempts
- Restrict SharePoint access via IP whitelisting to known corporate networks
- Monitor for unusual privilege escalation activities in SharePoint audit logs

DETECTION RULES:
- Alert on failed authentication followed by successful admin-level operations
- Monitor for JWT token validation failures and subsequent access grants
- Track unusual administrative actions from non-administrative user accounts
- Log all authentication bypass attempts in SharePoint ULS logs
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تطبيق تصحيحات أمان Microsoft على جميع خوادم SharePoint فوراً (الإصدارات 2019 و2016 و2013)
2. تعطيل خدمات SharePoint مؤقتاً إذا لم يتم التصحيح خلال 24 ساعة
3. تنفيذ تقسيم الشبكة لتقييد الوصول إلى الشبكات المصرح بها فقط
4. إلغاء وإعادة توليد جميع رموز JWT بيانات الاعتماد
5. فرض إعادة المصادقة لجميع جلسات SharePoint النشطة

إرشادات التصحيح:
- تحميل أحدث التحديثات التراكمية من Microsoft
- اختبار التصحيحات في بيئة غير الإنتاج أولاً
- جدولة نوافذ الصيانة لنشر الإنتاج
- التحقق من تثبيت التصحيح باستخدام أدوات Microsoft

الضوابط البديلة:
- تنفيذ قواعد جدار حماية تطبيقات الويب لحجب أنماط JWT المريبة
- تفعيل السجلات المحسنة لجميع محاولات المصادقة
- نشر توقيعات الكشف عن الاستغلال
- تقييد الوصول عبر القائمة البيضاء للعناوين
- مراقبة الأنشطة الإدارية غير العادية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.9.2.1 - User access management and authentication controls ECC 2024 A.9.4.3 - Password management and credential security ECC 2024 A.12.4.1 - Event logging and monitoring ECC 2024 A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
SAMA CSF ID.AM-2 - Software and hardware asset management SAMA CSF PR.AC-1 - Access control policy and procedures SAMA CSF PR.AC-6 - Authentication and authorization mechanisms SAMA CSF DE.CM-1 - Detection and analysis of anomalies
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access control ISO 27001:2022 A.8.2 - User endpoint devices ISO 27001:2022 A.8.3 - Privileged access rights ISO 27001:2022 A.12.6.1 - Management of technical vulnerabilities and exposures
🟣 PCI DSS v4.0
PCI DSS 2.1 - Change default passwords PCI DSS 6.2 - Security patches installation PCI DSS 7.1 - Limit access to system components PCI DSS 10.2 - Implement automated audit trails
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:SharePoint Server
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.36%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2024-01-31
Published 2024-01-10
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.