Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30100: CWE-426: Untrusted Search Path in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2024-30100cvecve-2024-30100cwe-426
Published: Tue Jun 11 2024 (06/11/2024, 17:00:02 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

Microsoft SharePoint Server Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:41:05 UTC

Technical Analysis

CVE-2024-30100 is a vulnerability classified under CWE-426 (Untrusted Search Path) affecting Microsoft SharePoint Enterprise Server 2016 version 16.0.0. This vulnerability arises when the software improperly handles the search path for loading executable binaries or libraries, allowing an attacker to influence which files are loaded. Specifically, an attacker with local access but no privileges can place a malicious binary in a location that the SharePoint server process will load, leading to remote code execution (RCE). The vulnerability requires user interaction but does not require authentication, meaning an attacker could trick a user or process into executing the malicious code. The CVSS 3.1 base score of 7.8 indicates a high severity with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, meaning the attack requires local access and user interaction but no privileges, and can fully compromise confidentiality, integrity, and availability of the system. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered a significant risk. The lack of patch links suggests that a fix may be pending or that mitigations must be applied manually or through configuration changes. The vulnerability is particularly critical because SharePoint servers often hold sensitive organizational data and are integral to collaboration and document management, making them attractive targets for attackers.

Potential Impact

For European organizations, the impact of CVE-2024-30100 is substantial. SharePoint Enterprise Server 2016 is widely used across Europe in both public and private sectors for document management and collaboration. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full system compromise. This could result in data breaches, loss of sensitive information, disruption of business operations, and potential lateral movement within networks. Given the high confidentiality, integrity, and availability impact, organizations could face regulatory penalties under GDPR if personal data is exposed. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users have elevated privileges or where attackers can trick users into executing malicious files. The absence of known exploits currently provides a window for proactive defense, but the threat landscape may evolve rapidly. European critical infrastructure, government agencies, and large enterprises using SharePoint 2016 are particularly at risk due to the strategic value of their data and services.

Mitigation Recommendations

To mitigate CVE-2024-30100 effectively, European organizations should: 1) Immediately review and restrict local user permissions on SharePoint servers to minimize the risk of untrusted file placement. 2) Implement application whitelisting and restrict executable search paths to trusted directories only. 3) Monitor file system and process creation events for suspicious activity indicative of exploitation attempts. 4) Educate users about the risks of executing untrusted files and enforce strict policies on software installation and execution. 5) Apply any available security updates or patches from Microsoft as soon as they are released. 6) Use endpoint detection and response (EDR) tools to detect anomalous behavior related to code execution on SharePoint servers. 7) Consider isolating SharePoint servers in segmented network zones to limit lateral movement in case of compromise. 8) Regularly audit SharePoint configurations and logs for signs of exploitation or attempted attacks. These steps go beyond generic advice by focusing on controlling the local environment and monitoring for exploitation vectors specific to untrusted search path vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:15.573Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec129

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/17/2025, 11:41:05 PM

Last updated: 1/19/2026, 7:57:48 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats