CVE-2023-36764

8.8 HIGH

📋 TL;DR

This vulnerability in Microsoft SharePoint Server allows authenticated attackers to elevate their privileges within the SharePoint environment. Attackers could gain administrative access to SharePoint sites and data. Organizations using vulnerable SharePoint Server versions are affected.

💻 Affected Systems

Products:
  • Microsoft SharePoint Server
Versions: Microsoft SharePoint Server 2019, SharePoint Server 2016, SharePoint Server Subscription Edition
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to SharePoint. All SharePoint Server deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over SharePoint Server, allowing them to access, modify, or delete all SharePoint data, install malicious components, and potentially pivot to other systems.

🟠

Likely Case

Attackers elevate from standard user to site collection administrator, gaining unauthorized access to sensitive documents, user data, and SharePoint configuration.

🟢

If Mitigated

With proper network segmentation, least privilege access, and monitoring, impact is limited to the SharePoint environment with detection of unauthorized privilege escalation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to SharePoint. The vulnerability is in SharePoint's privilege management, making exploitation relatively straightforward for attackers with initial access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: September 2023 security updates for SharePoint Server

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764

Restart Required: Yes

Instructions:

1. Download the September 2023 security update for your SharePoint Server version from Microsoft Update Catalog. 2. Apply the update to all SharePoint servers in the farm. 3. Run the SharePoint Products Configuration Wizard. 4. Restart all SharePoint servers and services.

🔧 Temporary Workarounds

Restrict SharePoint Access

all

Limit SharePoint access to only necessary users and implement strict authentication requirements

Implement Least Privilege

all

Ensure users have only the minimum necessary permissions in SharePoint

🧯 If You Can't Patch

  • Isolate SharePoint servers from other critical systems using network segmentation
  • Implement enhanced monitoring for privilege escalation attempts and unusual administrative activity

🔍 How to Verify

Check if Vulnerable:

Check SharePoint Server version against September 2023 security update. Vulnerable if running SharePoint Server 2016, 2019, or Subscription Edition without September 2023 patches.

Check Version:

Get-SPFarm | Select BuildVersion (PowerShell) or check Central Administration > Upgrade and Migration > Check product and patch installation status

Verify Fix Applied:

Verify SharePoint Server has September 2023 security updates installed and version numbers match patched versions in Microsoft advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events in SharePoint ULS logs
  • Unexpected user permission changes
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual authentication patterns to SharePoint
  • Unexpected administrative API calls

SIEM Query:

source="SharePoint" AND (event_id="PermissionChange" OR event_id="Elevation" OR user="*" AND action="AdminAction")

🔗 References

📤 Share & Export