CISA adds exploited Microsoft SharePoint flaw to KEV catalog and urges fast action
CISA has added a Microsoft SharePoint vulnerability, tracked as CVE-2026-20963, to its Known Exploited Vulnerabilities catalog after confirming active exploitation in the wild. The agency added the flaw on March 18, 2026 and set a remediation deadline of March 21, 2026 for Federal Civilian Executive Branch agencies under Binding Operational Directive 22-01.
The flaw affects Microsoft SharePoint Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition. NVD describes it as a deserialization of untrusted data issue that allows code execution over a network, while Microsoft rates it 8.8 on CVSS v3.1.
One important detail changes how admins should read this story. The sample article says the bug allows unauthenticated remote code execution, but Microsoft and NVD describe it as an authorized attacker issue, which means the official advisory requires privileges, not zero credentials. CISA still treats it as urgent because attackers are already exploiting it.
What CISA said
CISA said organizations should apply vendor mitigations, follow BOD 22-01 guidance for cloud services where relevant, or stop using the product if mitigations are unavailable. The KEV entry does not name the threat actor and does not say whether the flaw has been used in ransomware attacks.
For federal agencies, the deadline is especially tight. The KEV catalog lists March 21, 2026 as the due date for action, which gives defenders only a few days to reduce exposure.
What the vulnerability does
According to NVD, CVE-2026-20963 is a deserialization of untrusted data vulnerability in Microsoft Office SharePoint. In practical terms, this means SharePoint can process unsafe serialized data in a way that lets an attacker execute code over the network.
Microsoft’s published CVSS vector shows PR:L, which means low privileges are required. That makes the flaw serious, but it does not support claims of completely unauthenticated exploitation based on the official records now available.
Affected SharePoint versions
| Product | Status in public records |
|---|---|
| SharePoint Enterprise Server 2016 | Listed as affected |
| SharePoint Server 2019 | Listed as affected |
| SharePoint Server Subscription Edition | Listed as affected up to, but excluding, version 16.0.19127.20442 |
These affected configurations appear in NVD’s public entry for CVE-2026-20963.
Why this matters
SharePoint often stores internal documents, collaboration data, and business workflows, so code execution on a SharePoint server can become a gateway to broader compromise. Even when a flaw requires some level of access, active exploitation means attackers have already found ways to make it useful in real environments. That is why KEV inclusion matters more than the CVSS score alone.
The KEV catalog serves as one of the clearest public signals that defenders should move immediately. CISA only adds vulnerabilities to KEV when it has evidence of exploitation in the wild, and agencies must then remediate within the timeline CISA sets.
What administrators should do now
- Check whether any SharePoint Server 2016, 2019, or Subscription Edition deployments remain exposed.
- Review Microsoft’s advisory and apply the available security updates or mitigations.
- Follow CISA’s KEV guidance and accelerated remediation timeline.
- If mitigations are unavailable, consider taking the vulnerable product out of service until you can secure it.
Quick facts
| Item | Detail |
|---|---|
| CVE | CVE-2026-20963 |
| Product | Microsoft SharePoint |
| Issue type | Deserialization of untrusted data |
| Impact | Remote code execution over a network |
| Exploitation status | Actively exploited |
| KEV date added | March 18, 2026 |
| Federal due date | March 21, 2026 |
Source data comes from CISA and NVD.
FAQ
Yes. CISA added it to the KEV catalog on March 18, 2026, which confirms active exploitation in the wild.
The public NVD and Microsoft data describe it as an authorized attacker issue with low privileges required. That does not match claims of fully unauthenticated exploitation.
Public records list SharePoint Enterprise Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition. Subscription Edition is listed as affected up to, but excluding, version 16.0.19127.20442.
CISA set March 21, 2026 as the remediation deadline for affected federal civilian agencies.
CISA’s public guidance says organizations should apply vendor mitigations or discontinue use if mitigations are unavailable. Private-sector defenders should treat the KEV listing as an urgent patch signal even though the binding deadline applies to federal agencies.
Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more
User forum
0 messages