CVE-2023-35621

7.5 HIGH

📋 TL;DR

This vulnerability in Microsoft Dynamics 365 Finance and Operations allows attackers to cause a denial of service (DoS) condition by sending specially crafted requests to the application. Organizations running affected versions of Dynamics 365 Finance and Operations are vulnerable to service disruption. The vulnerability affects the availability of business-critical financial and operational systems.

💻 Affected Systems

Products:
  • Microsoft Dynamics 365 Finance
  • Microsoft Dynamics 365 Operations
Versions: Specific versions not detailed in public advisory; consult Microsoft Security Update Guide for exact affected versions
Operating Systems: Windows Server (hosting Dynamics 365)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Dynamics 365 Finance and Operations deployments; cloud and on-premises deployments may be affected differently

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Dynamics 365 Finance and Operations, disrupting financial transactions, supply chain operations, and business processes for extended periods.

🟠

Likely Case

Temporary service disruption requiring system restart or recovery procedures, impacting business operations until service is restored.

🟢

If Mitigated

Minimal impact with proper network segmentation, rate limiting, and monitoring that detects and blocks attack attempts before service disruption occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory; DoS vulnerabilities typically have low exploitation complexity

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest security updates from Microsoft; specific version depends on your Dynamics 365 deployment

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35621

Restart Required: Yes

Instructions:

1. Check Microsoft Security Update Guide for your specific Dynamics 365 version. 2. Apply the security update through your normal patching process. 3. Restart affected Dynamics 365 services. 4. Verify the update was applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Dynamics 365 Finance and Operations to only trusted networks and IP addresses

Rate Limiting

all

Implement rate limiting on web application firewalls or load balancers to prevent DoS attempts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Dynamics 365 application
  • Deploy web application firewall with DoS protection rules and monitor for unusual traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check your Dynamics 365 version against Microsoft's security update guide; review system logs for unusual request patterns or service disruptions

Check Version:

Check through Dynamics 365 administration portal or PowerShell: Get-Command -Module Microsoft.Dynamics.Nav.*

Verify Fix Applied:

Verify the security update is installed through Dynamics 365 administration tools; test application functionality; monitor for service stability

📡 Detection & Monitoring

Log Indicators:

  • Unusual request patterns to Dynamics 365 endpoints
  • Service restart events
  • High CPU/memory usage on Dynamics servers
  • Application pool recycling events

Network Indicators:

  • High volume of requests to Dynamics 365 from single or few sources
  • Unusual request patterns or malformed requests

SIEM Query:

source="dynamics365" AND (event_type="service_restart" OR error_code="500" OR request_count>threshold)

🔗 References

📤 Share & Export