Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-24955: CWE-94: Improper Control of Generation of Code ('Code Injection') in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2023-24955cvecve-2023-24955cwe-94
Published: Tue May 09 2023 (05/09/2023, 17:03:01 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Microsoft SharePoint Server Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 10/28/2025, 23:00:22 UTC

Technical Analysis

CVE-2023-24955 is a remote code execution vulnerability identified in Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. The root cause is classified under CWE-94, which refers to improper control of code generation, commonly known as code injection. This vulnerability allows an attacker who already has high-level privileges (PR:H) on the SharePoint server to execute arbitrary code remotely over the network (AV:N) without requiring user interaction (UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the system, as arbitrary code execution can lead to full system compromise. The CVSS v3.1 score of 7.2 reflects a high severity due to the ease of exploitation within a network context and the critical impact on the system. The vulnerability is currently published and assigned by Microsoft, but no public exploits or patches have been reported yet. SharePoint Enterprise Server 2016 is widely used in enterprise environments for collaboration and document management, making this vulnerability particularly concerning for organizations relying on this platform. The attacker must have high privileges, which typically means the vulnerability is exploitable by insiders or through prior compromise of privileged accounts. The lack of required user interaction simplifies exploitation once access is obtained. This vulnerability underscores the importance of strict privilege management and timely patching in enterprise collaboration platforms.

Potential Impact

For European organizations, the impact of CVE-2023-24955 can be significant due to the widespread use of Microsoft SharePoint Enterprise Server 2016 in government, finance, healthcare, and large enterprises. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to data breaches, unauthorized data manipulation, or disruption of critical collaboration services. This could compromise sensitive personal data protected under GDPR, leading to regulatory penalties and reputational damage. The high severity and network-based attack vector mean that attackers who gain elevated privileges could move laterally within networks, escalating the scope of compromise. Additionally, the disruption of SharePoint services could impact business continuity and collaboration workflows. Although no known exploits exist currently, the vulnerability’s presence in a critical enterprise platform makes it a prime target for threat actors, especially those targeting European organizations with valuable intellectual property or sensitive data.

Mitigation Recommendations

1. Apply official security patches from Microsoft immediately once they become available to address CVE-2023-24955. 2. Restrict administrative and high-privilege access to SharePoint servers using the principle of least privilege and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3. Monitor SharePoint server logs and network traffic for unusual activities indicative of privilege escalation or code injection attempts. 4. Implement network segmentation to isolate SharePoint servers from less trusted network segments, reducing the attack surface. 5. Regularly audit user accounts and permissions on SharePoint to identify and remove unnecessary high-privilege accounts. 6. Employ endpoint detection and response (EDR) tools to detect anomalous behavior on servers hosting SharePoint. 7. Educate IT staff on the risks associated with code injection vulnerabilities and the importance of timely patching and privilege management. 8. Prepare incident response plans specific to SharePoint compromise scenarios to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-01-31T20:37:47.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a6247d717aace218a4

Added to database: 10/21/2025, 7:06:14 PM

Last enriched: 10/28/2025, 11:00:22 PM

Last updated: 10/30/2025, 3:42:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats