CVE-2024-35260: CWE-426: Untrusted Search Path in Microsoft Microsoft Power Platform
An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.
AI Analysis
Technical Summary
CVE-2024-35260 is an untrusted search path vulnerability (CWE-426) identified in Microsoft Power Platform's Dataverse component. This vulnerability allows an authenticated attacker with high privileges to execute arbitrary code remotely over a network. The root cause lies in the way the software resolves file paths or executable locations without properly validating or restricting the search path, enabling an attacker to insert or influence malicious binaries or scripts that get executed in place of legitimate ones. The vulnerability affects the confidentiality, integrity, and availability of the affected systems because arbitrary code execution can lead to data theft, system manipulation, or denial of service. The CVSS v3.1 score of 8.0 reflects a high severity, with attack vector being network-based, requiring high complexity and privileges but no user interaction. The scope is changed, indicating that exploitation can affect resources beyond the initially vulnerable component. Although no public exploits are currently known, the vulnerability's nature and the widespread use of Microsoft Power Platform in enterprise environments make it a significant risk. The lack of specified affected versions suggests that the vulnerability may impact multiple or all current versions until patched. The vulnerability was reserved in May 2024 and published in late June 2024, indicating recent discovery and disclosure. The absence of patch links means organizations must monitor Microsoft advisories closely for updates. The vulnerability is particularly concerning because Microsoft Power Platform is widely used for building business applications and workflows, meaning exploitation could disrupt critical business processes.
Potential Impact
For European organizations, the impact of CVE-2024-35260 can be substantial. Microsoft Power Platform is extensively used across Europe for custom business applications, automation, and data management. Exploitation could lead to unauthorized code execution within enterprise environments, potentially resulting in data breaches, manipulation of business-critical workflows, and service disruptions. Confidentiality is at risk due to possible data exfiltration, integrity can be compromised by unauthorized changes to data or processes, and availability may be affected if systems are taken offline or corrupted. The requirement for authenticated access with high privileges limits the attack surface but also means insider threats or compromised privileged accounts pose a significant risk. Organizations with complex deployments or integrations with other systems may face cascading effects. Regulatory compliance impacts, such as GDPR violations due to data breaches, could lead to legal and financial penalties. The high severity score underscores the need for urgent attention to this vulnerability in European enterprises relying on Microsoft Power Platform.
Mitigation Recommendations
To mitigate CVE-2024-35260 effectively, European organizations should: 1) Immediately review and restrict access to Microsoft Power Platform environments, ensuring that only necessary users have high privilege levels. 2) Audit and harden environment variables and system PATH configurations on servers and workstations running Power Platform components to prevent untrusted path influence. 3) Implement strict application whitelisting and code integrity policies to block unauthorized binaries or scripts from executing. 4) Monitor logs and alerts for unusual activity related to Power Platform, especially focusing on privilege escalations or unexpected code execution attempts. 5) Prepare for rapid deployment of official patches or updates from Microsoft once released, including testing in controlled environments. 6) Educate administrators and developers about the risks of untrusted search paths and enforce secure coding and deployment practices. 7) Consider network segmentation to isolate critical Power Platform components from less trusted network zones. 8) Use multi-factor authentication and enhanced monitoring on accounts with high privileges to reduce risk of credential compromise. These targeted actions go beyond generic advice and address the specific exploitation vector and environment of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-35260: CWE-426: Untrusted Search Path in Microsoft Microsoft Power Platform
Description
An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.
AI-Powered Analysis
Technical Analysis
CVE-2024-35260 is an untrusted search path vulnerability (CWE-426) identified in Microsoft Power Platform's Dataverse component. This vulnerability allows an authenticated attacker with high privileges to execute arbitrary code remotely over a network. The root cause lies in the way the software resolves file paths or executable locations without properly validating or restricting the search path, enabling an attacker to insert or influence malicious binaries or scripts that get executed in place of legitimate ones. The vulnerability affects the confidentiality, integrity, and availability of the affected systems because arbitrary code execution can lead to data theft, system manipulation, or denial of service. The CVSS v3.1 score of 8.0 reflects a high severity, with attack vector being network-based, requiring high complexity and privileges but no user interaction. The scope is changed, indicating that exploitation can affect resources beyond the initially vulnerable component. Although no public exploits are currently known, the vulnerability's nature and the widespread use of Microsoft Power Platform in enterprise environments make it a significant risk. The lack of specified affected versions suggests that the vulnerability may impact multiple or all current versions until patched. The vulnerability was reserved in May 2024 and published in late June 2024, indicating recent discovery and disclosure. The absence of patch links means organizations must monitor Microsoft advisories closely for updates. The vulnerability is particularly concerning because Microsoft Power Platform is widely used for building business applications and workflows, meaning exploitation could disrupt critical business processes.
Potential Impact
For European organizations, the impact of CVE-2024-35260 can be substantial. Microsoft Power Platform is extensively used across Europe for custom business applications, automation, and data management. Exploitation could lead to unauthorized code execution within enterprise environments, potentially resulting in data breaches, manipulation of business-critical workflows, and service disruptions. Confidentiality is at risk due to possible data exfiltration, integrity can be compromised by unauthorized changes to data or processes, and availability may be affected if systems are taken offline or corrupted. The requirement for authenticated access with high privileges limits the attack surface but also means insider threats or compromised privileged accounts pose a significant risk. Organizations with complex deployments or integrations with other systems may face cascading effects. Regulatory compliance impacts, such as GDPR violations due to data breaches, could lead to legal and financial penalties. The high severity score underscores the need for urgent attention to this vulnerability in European enterprises relying on Microsoft Power Platform.
Mitigation Recommendations
To mitigate CVE-2024-35260 effectively, European organizations should: 1) Immediately review and restrict access to Microsoft Power Platform environments, ensuring that only necessary users have high privilege levels. 2) Audit and harden environment variables and system PATH configurations on servers and workstations running Power Platform components to prevent untrusted path influence. 3) Implement strict application whitelisting and code integrity policies to block unauthorized binaries or scripts from executing. 4) Monitor logs and alerts for unusual activity related to Power Platform, especially focusing on privilege escalations or unexpected code execution attempts. 5) Prepare for rapid deployment of official patches or updates from Microsoft once released, including testing in controlled environments. 6) Educate administrators and developers about the risks of untrusted search paths and enforce secure coding and deployment practices. 7) Consider network segmentation to isolate critical Power Platform components from less trusted network zones. 8) Use multi-factor authentication and enhanced monitoring on accounts with high privileges to reduce risk of credential compromise. These targeted actions go beyond generic advice and address the specific exploitation vector and environment of this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-05-14T20:14:47.412Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec14c
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 12/17/2025, 11:44:17 PM
Last updated: 1/19/2026, 7:58:41 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.