Skip to main content

CVE-2024-30100: CWE-426: Untrusted Search Path in Microsoft Microsoft SharePoint Enterprise Server 2016

High
VulnerabilityCVE-2024-30100cvecve-2024-30100cwe-426
Published: Tue Jun 11 2024 (06/11/2024, 17:00:02 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Microsoft SharePoint Server Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 18:09:58 UTC

Technical Analysis

CVE-2024-30100 is a high-severity vulnerability identified in Microsoft SharePoint Enterprise Server 2016, specifically version 16.0.0. The vulnerability is classified under CWE-426, which pertains to an Untrusted Search Path issue. This type of vulnerability arises when an application searches for and loads executable files or libraries from directories that are not securely controlled, allowing an attacker to influence the search path and execute arbitrary code. In this case, the vulnerability enables remote code execution (RCE) on the affected SharePoint server. The CVSS v3.1 base score is 7.8, indicating a high impact with the vector string AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it allows an attacker who can trick a user into interacting with a malicious file or path to execute arbitrary code with potentially full control over the SharePoint server. Given SharePoint's role in enterprise collaboration and document management, exploitation could lead to data theft, service disruption, or further network compromise.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial. SharePoint Enterprise Server 2016 is widely used in corporate, governmental, and educational institutions across Europe for document management and collaboration. Successful exploitation could lead to unauthorized access to sensitive data, including personal data protected under GDPR, intellectual property, and confidential communications. The high integrity and availability impact means attackers could alter or delete critical documents or disrupt business operations, potentially causing compliance violations and financial losses. Additionally, since the vulnerability requires local access and user interaction, phishing or social engineering campaigns could be used to trick employees into triggering the exploit, increasing the risk of targeted attacks. The lack of known exploits in the wild currently provides a window for mitigation, but the high severity score suggests that attackers may develop exploits soon, especially given the critical nature of SharePoint in enterprise environments.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately apply any available security patches or updates from Microsoft once released, as no patch links are currently provided but are expected. 2) Restrict local access to SharePoint servers to trusted administrators and users only, minimizing the attack surface. 3) Implement strict application whitelisting and path validation controls to prevent execution of unauthorized binaries or scripts from untrusted directories. 4) Educate users about the risks of interacting with untrusted files or links, emphasizing caution with email attachments and links that could trigger local code execution. 5) Monitor SharePoint server logs and network traffic for unusual activities indicative of exploitation attempts, such as unexpected process launches or file system changes. 6) Employ endpoint detection and response (EDR) solutions on SharePoint servers to detect and block suspicious behaviors related to untrusted path exploitation. 7) Consider isolating SharePoint servers within segmented network zones with limited access to reduce lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:15.573Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec129

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:09:58 PM

Last updated: 8/15/2025, 1:08:22 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats