Skip to main content

CVE-2024-35249: CWE-502: Deserialization of Untrusted Data in Microsoft Microsoft Dynamics 365 Business Central 2024 Release Wave 1

High
VulnerabilityCVE-2024-35249cvecve-2024-35249cwe-502
Published: Tue Jun 11 2024 (06/11/2024, 17:00:06 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 Business Central 2024 Release Wave 1

Description

Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 18:11:22 UTC

Technical Analysis

CVE-2024-35249 is a high-severity remote code execution (RCE) vulnerability affecting Microsoft Dynamics 365 Business Central 2024 Release Wave 1 (version 24.0). The root cause is identified as CWE-502: Deserialization of Untrusted Data. This vulnerability arises when the application deserializes data from untrusted sources without proper validation or sanitization, allowing an attacker to craft malicious serialized objects that, when deserialized by the vulnerable system, can execute arbitrary code. The CVSS 3.1 base score is 8.8, indicating a high impact with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and affecting confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability scope is unchanged (S:U), meaning the exploit affects resources managed by the vulnerable component. Although no known exploits are reported in the wild yet, the presence of this vulnerability in a widely used enterprise resource planning (ERP) system like Dynamics 365 Business Central poses a significant risk. Attackers with low complexity can leverage this flaw remotely to execute code with elevated privileges, potentially leading to full system compromise, data breaches, or disruption of business operations. The lack of published patches at the time of disclosure necessitates immediate attention to monitoring and mitigation strategies.

Potential Impact

For European organizations, the impact of CVE-2024-35249 is substantial due to the widespread adoption of Microsoft Dynamics 365 Business Central in various industries including manufacturing, retail, finance, and public sector entities. Successful exploitation can lead to unauthorized access to sensitive business data, manipulation of financial records, disruption of supply chain management, and potential ransomware deployment. Given the high confidentiality, integrity, and availability impact, organizations could face regulatory penalties under GDPR if personal or sensitive data is compromised. The vulnerability also threatens operational continuity, which is critical for sectors relying on real-time business management systems. Furthermore, the requirement of privileges to exploit suggests that insider threats or compromised credentials could be leveraged to trigger the attack, increasing the risk profile. The absence of user interaction in exploitation means automated attacks or wormable scenarios could emerge if exploit code becomes available, amplifying the threat landscape in Europe.

Mitigation Recommendations

European organizations should immediately audit and restrict access privileges to Microsoft Dynamics 365 Business Central environments, ensuring the principle of least privilege is enforced. Network segmentation should be applied to isolate the ERP system from less trusted networks and limit exposure to the internet. Monitoring and logging of deserialization processes and unusual application behavior should be enhanced to detect potential exploitation attempts early. Organizations should subscribe to Microsoft security advisories and apply patches or updates as soon as they are released. In the interim, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads targeting Dynamics 365 Business Central endpoints. Additionally, conduct thorough code reviews and penetration testing focused on deserialization vulnerabilities within custom extensions or integrations of the platform. Employee training on credential security and detection of suspicious activity is also recommended to mitigate risks from privilege misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.410Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec140

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:11:22 PM

Last updated: 7/31/2025, 8:09:21 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats