INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 8h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 8h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 8h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h
Vulnerabilities

CVE-2026-26114

High
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-502 — Weakness Type
Published: Mar 10, 2026  ·  Modified: Mar 17, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

🤖 AI Executive Summary

CVE-2026-26114 is a critical deserialization vulnerability in Microsoft SharePoint Server 2016 and 2019 that allows authenticated attackers to execute arbitrary code remotely with a CVSS score of 8.8. This vulnerability poses significant risk to Saudi organizations heavily reliant on SharePoint for document management and collaboration. Immediate patching is essential as the attack requires only valid credentials, which are common in enterprise environments.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 20:52
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability directly impacts Saudi government entities, ARAMCO, banking sector institutions under SAMA oversight, and large enterprises using SharePoint for critical document management. Government agencies managing sensitive policy documents, financial institutions storing customer data, and energy sector organizations are at highest risk. The vulnerability affects both on-premises and hybrid SharePoint deployments common in Saudi organizations. Potential impact includes unauthorized access to classified government documents, financial data theft, and operational disruption of critical infrastructure.
🏢 Affected Saudi Sectors
Government and Public Administration Banking and Financial Services Energy and Utilities (ARAMCO) Telecommunications (STC, Mobily) Healthcare Education Large Enterprises
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all SharePoint Server 2016 and 2019 instances in your environment using asset discovery tools
2. Restrict SharePoint access to trusted networks only using firewall rules and network segmentation
3. Implement multi-factor authentication (MFA) for all SharePoint user accounts to reduce credential compromise risk
4. Monitor SharePoint logs for suspicious deserialization activities and unusual code execution patterns

PATCHING GUIDANCE:
1. Apply Microsoft security updates immediately upon availability for SharePoint Server 2016 and 2019
2. Test patches in non-production environments first to ensure compatibility
3. Prioritize patching for internet-facing SharePoint instances
4. Schedule patching during maintenance windows with minimal business impact

COMPENSATING CONTROLS (if patching delayed):
1. Disable remote code execution features in SharePoint if not required for operations
2. Implement Web Application Firewall (WAF) rules to detect and block deserialization payloads
3. Use network-based intrusion detection/prevention systems (IDS/IPS) to monitor for exploitation attempts
4. Enforce principle of least privilege for SharePoint service accounts

DETECTION RULES:
1. Monitor for unusual .NET deserialization activities in SharePoint application logs
2. Alert on unexpected process creation from SharePoint worker processes (w3wp.exe)
3. Track failed and successful authentication attempts to SharePoint
4. Monitor for suspicious PowerShell execution originating from SharePoint services
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع مثيلات خادم SharePoint 2016 و2019 في بيئتك باستخدام أدوات اكتشاف الأصول
2. تقييد الوصول إلى SharePoint للشبكات الموثوقة فقط باستخدام قواعد جدار الحماية والفصل الشبكي
3. تنفيذ المصادقة متعددة العوامل (MFA) لجميع حسابات مستخدمي SharePoint لتقليل خطر اختراق بيانات الاعتماد
4. مراقبة سجلات SharePoint للأنشطة المريبة المتعلقة بفك التسلسل وأنماط تنفيذ الكود غير العادية

إرشادات التصحيح:
1. تطبيق تحديثات أمان Microsoft فوراً عند توفرها لخادم SharePoint 2016 و2019
2. اختبار التصحيحات في بيئات غير الإنتاج أولاً لضمان التوافقية
3. إعطاء الأولوية لتصحيح مثيلات SharePoint المواجهة للإنترنت
4. جدولة التصحيحات خلال نوافذ الصيانة بأقل تأثير على العمليات

الضوابط البديلة (إذا تأخر التصحيح):
1. تعطيل ميزات تنفيذ الكود البعيد في SharePoint إذا لم تكن مطلوبة للعمليات
2. تنفيذ قواعد جدار تطبيقات الويب (WAF) للكشف عن حمولات فك التسلسل وحجبها
3. استخدام أنظمة الكشف/الوقاية من الاختراق القائمة على الشبكة (IDS/IPS) لمراقبة محاولات الاستغلال
4. فرض مبدأ أقل امتياز لحسابات خدمة SharePoint

قواعد الكشف:
1. مراقبة أنشطة فك التسلسل غير العادية في سجلات تطبيق SharePoint
2. التنبيه على إنشاء عمليات غير متوقعة من عمليات عامل SharePoint (w3wp.exe)
3. تتبع محاولات المصادقة الفاشلة والناجحة لـ SharePoint
4. مراقبة تنفيذ PowerShell المريب الناشئ من خدمات SharePoint
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information security policies and procedures A.8.1.1 - User access management and authentication A.12.2.1 - Change management procedures A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
ID.AM-2 - Software inventory and asset management PR.AC-1 - Access control and authentication mechanisms PR.PT-2 - Protective technology deployment DE.CM-8 - Vulnerability scanning and management
🟡 ISO 27001:2022
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Change management procedures A.5.1.1 - Information security policies A.8.1.4 - Access rights review and management
🟣 PCI DSS v4.0
6.2 - Security patches and updates 6.5.1 - Injection flaws prevention 11.2 - Vulnerability scanning
📦 Affected Products / CPE 2 entries
microsoft:sharepoint_server:2016
microsoft:sharepoint_server:2019
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-502
Exploit No
Patch ✓ Yes
Published 2026-03-10
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-502
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.