Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32987: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Microsoft SharePoint Enterprise Server 2016

0
High
VulnerabilityCVE-2024-32987cvecve-2024-32987cwe-918
Published: Tue Jul 09 2024 (07/09/2024, 17:02:40 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SharePoint Enterprise Server 2016

Description

CVE-2024-32987 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Microsoft SharePoint Enterprise Server 2016 (version 16. 0. 0). It allows unauthenticated remote attackers to induce the server to make arbitrary requests, potentially leading to sensitive information disclosure. The vulnerability does not impact integrity or availability but can expose confidential data. Exploitation requires no user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. European organizations using SharePoint 2016 should prioritize patching once available and implement network-level restrictions to mitigate risk. Countries with high SharePoint adoption and critical infrastructure reliance on Microsoft products are most at risk. The CVSS score of 7.

AI-Powered Analysis

AILast updated: 12/17/2025, 00:35:16 UTC

Technical Analysis

CVE-2024-32987 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, affecting Microsoft SharePoint Enterprise Server 2016 version 16.0.0. SSRF vulnerabilities occur when an attacker can abuse a server functionality to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network access controls. In this case, the vulnerability allows unauthenticated remote attackers to coerce the SharePoint server into sending crafted requests, which can lead to information disclosure. The vulnerability specifically impacts confidentiality by exposing sensitive internal data or metadata that should not be accessible externally. The CVSS 3.1 base score of 7.5 indicates a high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity (I:N) or availability (A:N). The exploitability is straightforward due to lack of authentication and user interaction requirements. Although no public exploits are currently known, the vulnerability poses a significant risk to organizations running the affected SharePoint version, especially those exposing SharePoint servers to untrusted networks. The absence of patch links suggests that a fix may be forthcoming or pending deployment. The vulnerability was reserved in April 2024 and published in July 2024, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this SSRF vulnerability in SharePoint 2016 can lead to unauthorized disclosure of sensitive internal information, including potentially confidential documents, internal network details, or metadata. This can facilitate further attacks such as internal reconnaissance, lateral movement, or targeted data exfiltration. Given SharePoint's widespread use in enterprise collaboration and document management, the confidentiality breach could affect intellectual property, personal data protected under GDPR, and critical business information. The vulnerability does not directly affect system integrity or availability, but the information disclosure alone can have severe compliance and reputational consequences. Organizations with SharePoint servers accessible from the internet or less segmented internal networks are at higher risk. The lack of authentication requirement and ease of exploitation increase the threat level, making it attractive for attackers seeking to gain initial footholds or gather intelligence. The impact is particularly critical for sectors handling sensitive data such as finance, healthcare, government, and critical infrastructure within Europe.

Mitigation Recommendations

1. Apply security patches from Microsoft as soon as they are released for SharePoint Enterprise Server 2016 to remediate the vulnerability. 2. Until patches are available, restrict external access to SharePoint servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns or anomalous outbound requests originating from SharePoint servers. 4. Monitor network traffic logs for unusual outbound requests from SharePoint servers to internal or external resources that could indicate exploitation attempts. 5. Review and harden SharePoint configurations to minimize unnecessary services or features that could be leveraged in SSRF attacks. 6. Conduct internal vulnerability scans and penetration tests focusing on SSRF vectors to identify and mitigate similar weaknesses. 7. Educate IT and security teams about SSRF risks and encourage rapid incident response readiness. 8. Implement strict access controls and least privilege principles for SharePoint administrative accounts to reduce potential damage if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-04-22T18:16:31.979Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb5c2

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 12/17/2025, 12:35:16 AM

Last updated: 1/19/2026, 7:56:51 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats