CVE-2024-35263

5.7 MEDIUM

📋 TL;DR

This vulnerability in Microsoft Dynamics 365 (On-Premises) allows an authenticated attacker to access sensitive information they shouldn't have permission to view. It affects organizations running on-premises deployments of Dynamics 365, potentially exposing confidential business data.

💻 Affected Systems

Products:
  • Microsoft Dynamics 365 (On-Premises)
Versions: Specific versions not detailed in CVE; all on-premises deployments before patching
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-premises deployments; Dynamics 365 Online/SaaS versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains access to sensitive business data, customer information, financial records, or proprietary information stored in Dynamics 365, leading to data breach, regulatory violations, and reputational damage.

🟠

Likely Case

An authenticated user with some access privileges escalates their information access beyond intended permissions, potentially viewing sensitive records they shouldn't have access to.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users gaining slightly more information access than intended, but no system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the Dynamics 365 instance; attacker needs valid credentials to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Microsoft Dynamics 365 updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35263

Restart Required: Yes

Instructions:

1. Download latest Dynamics 365 updates from Microsoft Update Catalog. 2. Apply updates to all affected Dynamics 365 servers. 3. Restart Dynamics 365 services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Restrict Access

all

Limit network access to Dynamics 365 servers to only authorized users and systems

Enforce Least Privilege

all

Review and tighten user permissions in Dynamics 365 to minimize potential information exposure

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Dynamics 365 servers
  • Enhance monitoring and logging of user access to sensitive data within Dynamics 365

🔍 How to Verify

Check if Vulnerable:

Check Dynamics 365 version and compare against patched versions in Microsoft advisory

Check Version:

Check Dynamics 365 version through administration console or PowerShell: Get-Command -Module Microsoft.Dynamics.Nav.*

Verify Fix Applied:

Verify Dynamics 365 version after update matches patched version and test information access controls

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to sensitive data tables
  • Multiple failed permission elevation attempts followed by successful access

Network Indicators:

  • Unusual data extraction patterns from Dynamics 365 servers

SIEM Query:

source="dynamics365" AND (event_type="data_access" AND user_privilege_change=true) OR (data_volume_extracted > threshold)

🔗 References

📤 Share & Export