Skip to main content

CVE-2024-21328: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

High
VulnerabilityCVE-2024-21328cvecve-2024-21328cwe-79
Published: Tue Feb 13 2024 (02/13/2024, 18:02:28 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Dynamics 365 Sales Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:35:07 UTC

Technical Analysis

CVE-2024-21328 is a high-severity cross-site scripting (XSS) vulnerability identified in Microsoft Dynamics 365 (on-premises) version 9.1, specifically affecting version 9.0. This vulnerability is categorized under CWE-79, which involves improper neutralization of input during web page generation. The flaw allows an attacker with low privileges (PR:L) to execute a reflected XSS attack that requires user interaction (UI:R). The vulnerability is remotely exploitable over the network (AV:N) without the need for elevated privileges, but it does require some level of authenticated access. The scope of the vulnerability is changed (S:C), meaning the attack can impact resources beyond the initially vulnerable component. The CVSS v3.1 base score is 7.6, indicating a high severity level. The impact on confidentiality is high (C:H), as the attacker can potentially steal sensitive information or session tokens, while integrity impact is low (I:L), and availability impact is none (A:N). The vulnerability could be exploited to perform spoofing attacks within the Dynamics 365 Sales module, potentially allowing attackers to inject malicious scripts that execute in the context of legitimate users' browsers. This can lead to session hijacking, unauthorized actions, or data theft. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in December 2023 and published in February 2024, with enrichment from CISA, indicating recognition by US cybersecurity authorities. Given the nature of Dynamics 365 as a widely used enterprise CRM platform, this vulnerability poses a significant risk to organizations relying on on-premises deployments of version 9.0 or 9.1, especially where user interaction with the affected web components is common.

Potential Impact

For European organizations, the impact of CVE-2024-21328 can be substantial due to the widespread use of Microsoft Dynamics 365 in various sectors including finance, manufacturing, retail, and public administration. Exploitation of this vulnerability could lead to unauthorized disclosure of sensitive customer and business data, undermining confidentiality and potentially violating GDPR requirements. The spoofing and XSS attack vectors could facilitate phishing campaigns or lateral movement within the network, increasing the risk of broader compromise. Since the vulnerability requires authenticated access and user interaction, insider threats or compromised user accounts could be leveraged by attackers. The integrity impact is lower, but the ability to execute malicious scripts can still disrupt business processes or manipulate displayed information. The absence of availability impact means systems remain operational, but the trustworthiness of the data and user sessions is compromised. This could damage organizational reputation and lead to financial losses or regulatory penalties. Additionally, the on-premises nature of the affected product means that patch management and mitigation depend heavily on the organization's internal IT capabilities, which vary across Europe.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediate review and restriction of user privileges in Dynamics 365 to minimize the number of users with access capable of triggering the vulnerability. 2) Implement strict input validation and output encoding on all user-supplied data within Dynamics 365 customizations or integrations to reduce XSS risks. 3) Monitor and audit user activities for unusual behavior that could indicate exploitation attempts, focusing on authenticated sessions interacting with the Sales module. 4) Deploy web application firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting Dynamics 365 endpoints. 5) Educate users about phishing and social engineering risks, as user interaction is required for exploitation. 6) Stay alert for official Microsoft patches or security updates and apply them promptly once available. 7) Consider isolating or segmenting the Dynamics 365 environment to limit lateral movement in case of compromise. 8) Conduct penetration testing and vulnerability assessments focused on Dynamics 365 to identify and remediate related security gaps. These measures go beyond generic advice by focusing on privilege management, monitoring, and environment segmentation tailored to the specific Dynamics 365 context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:19.368Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeaa77

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:35:07 AM

Last updated: 8/16/2025, 1:59:27 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats