CVE-2024-35248: CWE-1390: Weak Authentication in Microsoft Microsoft Dynamics 365 Business Central 2023 Release Wave 1
Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
AI Analysis
Technical Summary
CVE-2024-35248 is a high-severity elevation of privilege vulnerability affecting Microsoft Dynamics 365 Business Central 2023 Release Wave 1, specifically version 22.0.0. The vulnerability is classified under CWE-1390, which relates to weak authentication mechanisms. This flaw allows an attacker to bypass normal authentication controls, potentially gaining elevated privileges without requiring prior authentication or user interaction. The CVSS 3.1 base score of 7.3 reflects a network attack vector (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, though confidentiality and integrity impacts are low, and availability impact is low as well. The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component. The weakness in authentication could allow an attacker to execute unauthorized actions or access sensitive business data within the Dynamics 365 Business Central environment. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used enterprise resource planning (ERP) system poses a significant risk to organizations relying on this software for critical business operations.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Microsoft Dynamics 365 Business Central is widely adopted across Europe, especially among small and medium enterprises (SMEs) for financial management, supply chain, and operations. Exploitation could lead to unauthorized access to sensitive financial and operational data, manipulation of business processes, and disruption of services. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data exposure), and reputational damage. Given the integration of Dynamics 365 with other Microsoft cloud services, a successful attack might also facilitate lateral movement within an organization's IT environment, increasing the risk of broader compromise. The lack of required privileges or user interaction for exploitation heightens the threat, making it easier for attackers to target vulnerable systems remotely over the network.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize applying any available security updates or patches from Microsoft as soon as they are released. In the absence of immediate patches, organizations should implement network-level protections such as restricting access to Dynamics 365 Business Central instances via firewalls or VPNs, limiting exposure to trusted IP addresses only. Employing multi-factor authentication (MFA) for all user accounts interacting with the system can add an additional layer of defense, even though the vulnerability itself bypasses authentication. Monitoring and logging access to Dynamics 365 Business Central should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten role-based access controls (RBAC) within the application to minimize the privileges assigned to users and service accounts. Regular security assessments and penetration testing focused on Dynamics 365 deployments can help identify and remediate configuration weaknesses that might be exploited in conjunction with this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Ireland
CVE-2024-35248: CWE-1390: Weak Authentication in Microsoft Microsoft Dynamics 365 Business Central 2023 Release Wave 1
Description
Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-35248 is a high-severity elevation of privilege vulnerability affecting Microsoft Dynamics 365 Business Central 2023 Release Wave 1, specifically version 22.0.0. The vulnerability is classified under CWE-1390, which relates to weak authentication mechanisms. This flaw allows an attacker to bypass normal authentication controls, potentially gaining elevated privileges without requiring prior authentication or user interaction. The CVSS 3.1 base score of 7.3 reflects a network attack vector (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, though confidentiality and integrity impacts are low, and availability impact is low as well. The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component. The weakness in authentication could allow an attacker to execute unauthorized actions or access sensitive business data within the Dynamics 365 Business Central environment. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used enterprise resource planning (ERP) system poses a significant risk to organizations relying on this software for critical business operations.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Microsoft Dynamics 365 Business Central is widely adopted across Europe, especially among small and medium enterprises (SMEs) for financial management, supply chain, and operations. Exploitation could lead to unauthorized access to sensitive financial and operational data, manipulation of business processes, and disruption of services. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data exposure), and reputational damage. Given the integration of Dynamics 365 with other Microsoft cloud services, a successful attack might also facilitate lateral movement within an organization's IT environment, increasing the risk of broader compromise. The lack of required privileges or user interaction for exploitation heightens the threat, making it easier for attackers to target vulnerable systems remotely over the network.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize applying any available security updates or patches from Microsoft as soon as they are released. In the absence of immediate patches, organizations should implement network-level protections such as restricting access to Dynamics 365 Business Central instances via firewalls or VPNs, limiting exposure to trusted IP addresses only. Employing multi-factor authentication (MFA) for all user accounts interacting with the system can add an additional layer of defense, even though the vulnerability itself bypasses authentication. Monitoring and logging access to Dynamics 365 Business Central should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten role-based access controls (RBAC) within the application to minimize the privileges assigned to users and service accounts. Regular security assessments and penetration testing focused on Dynamics 365 deployments can help identify and remediate configuration weaknesses that might be exploited in conjunction with this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-05-14T20:14:47.410Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec13e
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 6:11:09 PM
Last updated: 7/30/2025, 6:05:12 AM
Views: 13
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.