CISA added SharePoint CVE-2026-20963 to its Known Exploited Vulnerabilities catalog on March 18, 2026, confirming active exploitation of a critical deserialization vulnerability. Federal agencies have until March 21—three days—to patch under the BOD 22-01 directive. Unknown attackers are already exploiting the unauthenticated remote code execution flaw in SharePoint Server 2016, 2019, and Subscription Edition. Here’s the uncomfortable reality: Microsoft released the patch in January. Organizations that didn’t patch aggressively now face a 72-hour emergency deadline.
The Two-Month Gap Nobody Wants to Talk About
Microsoft quietly patched CVE-2026-20963 on January 13, 2026, as part of security update KB5002822. The vulnerability sat dormant in patch notes for two months. Then CISA detected active exploitation and escalated it to Known Exploited Vulnerabilities status—a catalog reserved for threats actively weaponized in the wild.
The standard BOD 22-01 timeline gives federal agencies two weeks to remediate newly listed vulnerabilities. CISA cut that to three days. When they shrink a two-week window to 72 hours, they’re signaling grave risk to the Federal Enterprise. Translation: attackers are actively breaching SharePoint servers right now, and the exposure window is critical.
This raises uncomfortable questions. Were organizations ignoring January’s patch because SharePoint updates are notoriously disruptive? Was exploitation silent for two months before CISA caught it? Should Microsoft have flagged this more aggressively in January instead of burying it in a routine patch bundle? The gap between patch availability and enforcement action demonstrates the on-premise patching problem: no auto-updates, no forced compliance, just organizations gambling that they won’t get hit before the next maintenance window.
What CVE-2026-20963 Actually Does
CVE-2026-20963 scores 9.8 out of 10 on the CVSS severity scale. It’s a deserialization of untrusted data vulnerability that enables unauthenticated remote code execution. Break that down: network attackable, no credentials required, no user interaction needed, low attack complexity. An attacker sends a maliciously crafted payload to a vulnerable SharePoint server, the server deserializes it without validating what’s inside, and arbitrary code executes with SharePoint’s privileges.
The technical culprit is .NET’s BinaryFormatter and ObjectStateFormatter—serialization formatters that SharePoint uses to convert data for storage and transmission. These formatters will instantiate any class available in the application domain if specified in the serialized stream, assuming the data is trustworthy. It isn’t. Microsoft’s own .NET security documentation states bluntly: “BinaryFormatter is dangerous and is not recommended for data processing. BinaryFormatter is insecure and can’t be made secure.”
Yet SharePoint still uses it for legacy compatibility. The result: an attacker who exploits CVE-2026-20963 achieves complete server compromise. They can access all SharePoint data—documents, credentials, enterprise information. They can pivot from the SharePoint server into the internal network. They can install ransomware, exfiltrate intellectual property, or establish persistence for future attacks. In an on-premise scenario where SharePoint connects to internal systems, this becomes a vector for lateral movement across the enterprise.
Why On-Premise SharePoint Creates a Patching Time Bomb
SharePoint Online users weren’t affected by CVE-2026-20963. Microsoft auto-patches cloud infrastructure. The vulnerability window exists only for on-premise deployments—Server 2016, 2019, and Subscription Edition—where organizations control patching schedules.
Here’s where it gets worse: SharePoint Server 2016 and 2019 support ends July 14, 2026, four months from now. After that date, Microsoft stops releasing security updates. Any new vulnerability discovered in 2016 or 2019 after July will never be patched. Organizations still running these versions face a double deadline: patch CVE-2026-20963 immediately and migrate before July, or run unpatched, vulnerable software indefinitely.
The migration costs aren’t trivial. Small SharePoint deployments cost $5,000 to $25,000 to migrate. Enterprise deployments run $150,000 to $500,000. That’s why 200,000+ organizations—including 80% of Fortune 500 companies—still operate on-premise SharePoint despite the patching burden. But CVE-2026-20963 demonstrates the risk: a two-month window between patch release and active exploitation is enough time for attackers to breach unpatched systems.
The Broader Deserialization Problem Microsoft Can’t Fix
CVE-2026-20963 isn’t an isolated SharePoint bug. It’s a symptom of a systemic .NET ecosystem problem: insecure deserialization. BinaryFormatter has been known-dangerous for years. Microsoft deprecated it in .NET 9, where it now throws exceptions on use. But SharePoint, built on decades of .NET legacy code, can’t easily migrate away without breaking backward compatibility.
Deserialization vulnerabilities consistently appear in the OWASP Top 10 because they’re fundamentally hard to secure. Any system that deserializes untrusted data without strict type validation opens itself to code execution attacks. Microsoft knows this—their documentation explicitly warns against BinaryFormatter—but removing it from SharePoint would require rewriting core serialization logic that thousands of organizations depend on.
This creates a technical debt crisis. Legacy .NET applications like SharePoint carry deserialization attack surface that can’t be eliminated without breaking deployments. Developers building on SharePoint inherit these risks. The only viable long-term solution is migration to modern serialization frameworks like System.Text.Json with strict type handling, but that requires significant refactoring that Microsoft hasn’t prioritized.
What You Need to Do Right Now
If you manage on-premise SharePoint Server 2016, 2019, or Subscription Edition, here’s your immediate action checklist:
Check your SharePoint version:
Get-SPProduct -Local
If you’re running an affected version, apply KB5002822 immediately. Download it from the Microsoft Update Catalog, test in staging, deploy to production. Don’t wait for your next scheduled maintenance window—active exploitation means attackers are scanning for vulnerable SharePoint servers now.
Check for compromise. Review SharePoint logs from January through March for unusual activity: unexpected code execution, suspicious file access, privilege escalation attempts. If you find indicators of breach, engage your incident response team. Assume attackers may have already established persistence.
Implement network segmentation. Limit SharePoint server exposure to the internet. Use firewall rules, VPN-only access, or internal-only deployment if possible. Reducing attack surface buys time while you patch and investigate.
Plan your migration. If you’re on SharePoint 2016 or 2019, you have four months until end-of-life on July 14, 2026. After that, no more security patches. Your options: migrate to SharePoint Online (cloud, auto-patching, Microsoft-managed security) or upgrade to Subscription Edition (on-premise with ongoing support). Start planning now—enterprise migrations take months.
Key Takeaways
CISA’s three-day deadline isn’t theater. It’s a signal that exploitation is active and the risk is grave. Federal agencies scrambling to patch in 72 hours reflects the reality that on-premise SharePoint creates vulnerability windows that cloud deployments don’t have.
The two-month gap between Microsoft’s January patch and CISA’s March KEV addition reveals the on-premise security problem: organizations that don’t patch aggressively become targets. SharePoint Online eliminates this lag through auto-patching. On-premise deployments don’t have that safety net.
CVE-2026-20963 demonstrates that deserialization remains a critical threat in the .NET ecosystem. Microsoft can’t remove BinaryFormatter from SharePoint without breaking compatibility, so the attack surface persists. Developers building on SharePoint inherit this technical debt.
With SharePoint 2016 and 2019 reaching end-of-life in four months, organizations face a strategic inflection point: invest in migration or accept running unpatched software after July 14. CVE-2026-20963 won’t be the last vulnerability—it’s just the last one with a patch.

