Skip to main content

CVE-2024-35248: CWE-1390: Weak Authentication in Microsoft Microsoft Dynamics 365 Business Central 2023 Release Wave 1

High
VulnerabilityCVE-2024-35248cvecve-2024-35248cwe-1390
Published: Tue Jun 11 2024 (06/11/2024, 17:00:05 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 Business Central 2023 Release Wave 1

Description

Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 18:11:09 UTC

Technical Analysis

CVE-2024-35248 is a high-severity elevation of privilege vulnerability affecting Microsoft Dynamics 365 Business Central 2023 Release Wave 1, specifically version 22.0.0. The vulnerability is classified under CWE-1390, which relates to weak authentication mechanisms. This flaw allows an attacker to bypass normal authentication controls, potentially gaining elevated privileges without requiring prior authentication or user interaction. The CVSS 3.1 base score of 7.3 reflects a network attack vector (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, though confidentiality and integrity impacts are low, and availability impact is low as well. The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component. The weakness in authentication could allow an attacker to execute unauthorized actions or access sensitive business data within the Dynamics 365 Business Central environment. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used enterprise resource planning (ERP) system poses a significant risk to organizations relying on this software for critical business operations.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Microsoft Dynamics 365 Business Central is widely adopted across Europe, especially among small and medium enterprises (SMEs) for financial management, supply chain, and operations. Exploitation could lead to unauthorized access to sensitive financial and operational data, manipulation of business processes, and disruption of services. This could result in financial losses, regulatory non-compliance (e.g., GDPR violations due to data exposure), and reputational damage. Given the integration of Dynamics 365 with other Microsoft cloud services, a successful attack might also facilitate lateral movement within an organization's IT environment, increasing the risk of broader compromise. The lack of required privileges or user interaction for exploitation heightens the threat, making it easier for attackers to target vulnerable systems remotely over the network.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize applying any available security updates or patches from Microsoft as soon as they are released. In the absence of immediate patches, organizations should implement network-level protections such as restricting access to Dynamics 365 Business Central instances via firewalls or VPNs, limiting exposure to trusted IP addresses only. Employing multi-factor authentication (MFA) for all user accounts interacting with the system can add an additional layer of defense, even though the vulnerability itself bypasses authentication. Monitoring and logging access to Dynamics 365 Business Central should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten role-based access controls (RBAC) within the application to minimize the privileges assigned to users and service accounts. Regular security assessments and penetration testing focused on Dynamics 365 deployments can help identify and remediate configuration weaknesses that might be exploited in conjunction with this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.410Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec13e

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:11:09 PM

Last updated: 7/30/2025, 6:05:12 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats