CVE-2023-36764
📋 TL;DR
This vulnerability in Microsoft SharePoint Server allows authenticated attackers to elevate their privileges within the SharePoint environment. Attackers could gain administrative access to SharePoint sites and data. Organizations using vulnerable SharePoint Server versions are affected.
💻 Affected Systems
- Microsoft SharePoint Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control over SharePoint Server, allowing them to access, modify, or delete all SharePoint data, install malicious components, and potentially pivot to other systems.
Likely Case
Attackers elevate from standard user to site collection administrator, gaining unauthorized access to sensitive documents, user data, and SharePoint configuration.
If Mitigated
With proper network segmentation, least privilege access, and monitoring, impact is limited to the SharePoint environment with detection of unauthorized privilege escalation attempts.
🎯 Exploit Status
Exploitation requires authenticated access to SharePoint. The vulnerability is in SharePoint's privilege management, making exploitation relatively straightforward for attackers with initial access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: September 2023 security updates for SharePoint Server
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764
Restart Required: Yes
Instructions:
1. Download the September 2023 security update for your SharePoint Server version from Microsoft Update Catalog. 2. Apply the update to all SharePoint servers in the farm. 3. Run the SharePoint Products Configuration Wizard. 4. Restart all SharePoint servers and services.
🔧 Temporary Workarounds
Restrict SharePoint Access
allLimit SharePoint access to only necessary users and implement strict authentication requirements
Implement Least Privilege
allEnsure users have only the minimum necessary permissions in SharePoint
🧯 If You Can't Patch
- Isolate SharePoint servers from other critical systems using network segmentation
- Implement enhanced monitoring for privilege escalation attempts and unusual administrative activity
🔍 How to Verify
Check if Vulnerable:
Check SharePoint Server version against September 2023 security update. Vulnerable if running SharePoint Server 2016, 2019, or Subscription Edition without September 2023 patches.
Check Version:
Get-SPFarm | Select BuildVersion (PowerShell) or check Central Administration > Upgrade and Migration > Check product and patch installation status
Verify Fix Applied:
Verify SharePoint Server has September 2023 security updates installed and version numbers match patched versions in Microsoft advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation events in SharePoint ULS logs
- Unexpected user permission changes
- Administrative actions from non-admin accounts
Network Indicators:
- Unusual authentication patterns to SharePoint
- Unexpected administrative API calls
SIEM Query:
source="SharePoint" AND (event_id="PermissionChange" OR event_id="Elevation" OR user="*" AND action="AdminAction")