CVE-2024-35260: CWE-426: Untrusted Search Path in Microsoft Microsoft Power Platform
An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.
AI Analysis
Technical Summary
CVE-2024-35260 is a high-severity vulnerability classified under CWE-426 (Untrusted Search Path) affecting Microsoft Power Platform, specifically Microsoft Dataverse. The vulnerability allows an authenticated attacker with high privileges to exploit the untrusted search path issue to execute arbitrary code remotely over a network. An untrusted search path vulnerability occurs when an application or service loads executable files or libraries from directories that are not securely controlled, allowing an attacker to place malicious files in those directories. When the application subsequently loads these files, it inadvertently executes the attacker's code. In this case, the vulnerability resides within Microsoft Dataverse, a core component of the Power Platform used for data storage and management. The attacker must have authenticated access with high privileges, indicating that the attacker could be an insider or someone who has already compromised a user account with elevated rights. The CVSS v3.1 base score is 8.0 (high), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), high privileges required (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, meaning the attacker can fully compromise the system, execute arbitrary code, and potentially pivot to other systems. No known exploits are reported in the wild yet, and no specific affected versions are listed, suggesting the vulnerability may affect multiple or all versions of Microsoft Power Platform until patched. No patch links are currently provided, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on Microsoft Power Platform and Dataverse for critical business applications and data management. Successful exploitation could lead to unauthorized code execution within the network, potentially resulting in data breaches, disruption of business processes, and lateral movement within corporate networks. Given the high privileges required, the threat is more likely to be exploited by malicious insiders or attackers who have already gained elevated access. However, once exploited, the attacker could compromise sensitive personal data protected under GDPR, leading to regulatory penalties and reputational damage. The network-based attack vector increases the risk of widespread impact across interconnected systems. The change in scope means that the vulnerability could affect components beyond the initially targeted system, amplifying the potential damage. The lack of user interaction requirement facilitates automated exploitation once access is obtained. Overall, the vulnerability could disrupt operations, compromise data integrity, and expose organizations to compliance violations.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately audit and restrict privileged access to Microsoft Power Platform and Dataverse environments to minimize the number of users with high privileges. 2) Monitor and log all activities related to Power Platform administration and Dataverse usage to detect anomalous behavior indicative of exploitation attempts. 3) Apply the principle of least privilege rigorously to reduce the attack surface. 4) Until an official patch is released, consider isolating or segmenting Power Platform environments from critical network segments to limit potential lateral movement. 5) Review and harden the search path configurations and environment variables on systems hosting Microsoft Power Platform components to ensure only trusted directories are included. 6) Educate administrators and users with elevated privileges about the risks of this vulnerability and the importance of secure credential management. 7) Stay updated with Microsoft security advisories and apply patches promptly once available. 8) Conduct penetration testing and vulnerability assessments focused on Power Platform to identify any exploitation attempts or related weaknesses. These targeted actions go beyond generic advice by focusing on access control, environment hardening, and proactive monitoring specific to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2024-35260: CWE-426: Untrusted Search Path in Microsoft Microsoft Power Platform
Description
An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.
AI-Powered Analysis
Technical Analysis
CVE-2024-35260 is a high-severity vulnerability classified under CWE-426 (Untrusted Search Path) affecting Microsoft Power Platform, specifically Microsoft Dataverse. The vulnerability allows an authenticated attacker with high privileges to exploit the untrusted search path issue to execute arbitrary code remotely over a network. An untrusted search path vulnerability occurs when an application or service loads executable files or libraries from directories that are not securely controlled, allowing an attacker to place malicious files in those directories. When the application subsequently loads these files, it inadvertently executes the attacker's code. In this case, the vulnerability resides within Microsoft Dataverse, a core component of the Power Platform used for data storage and management. The attacker must have authenticated access with high privileges, indicating that the attacker could be an insider or someone who has already compromised a user account with elevated rights. The CVSS v3.1 base score is 8.0 (high), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), high privileges required (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, meaning the attacker can fully compromise the system, execute arbitrary code, and potentially pivot to other systems. No known exploits are reported in the wild yet, and no specific affected versions are listed, suggesting the vulnerability may affect multiple or all versions of Microsoft Power Platform until patched. No patch links are currently provided, indicating that remediation may still be pending or in progress.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on Microsoft Power Platform and Dataverse for critical business applications and data management. Successful exploitation could lead to unauthorized code execution within the network, potentially resulting in data breaches, disruption of business processes, and lateral movement within corporate networks. Given the high privileges required, the threat is more likely to be exploited by malicious insiders or attackers who have already gained elevated access. However, once exploited, the attacker could compromise sensitive personal data protected under GDPR, leading to regulatory penalties and reputational damage. The network-based attack vector increases the risk of widespread impact across interconnected systems. The change in scope means that the vulnerability could affect components beyond the initially targeted system, amplifying the potential damage. The lack of user interaction requirement facilitates automated exploitation once access is obtained. Overall, the vulnerability could disrupt operations, compromise data integrity, and expose organizations to compliance violations.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Immediately audit and restrict privileged access to Microsoft Power Platform and Dataverse environments to minimize the number of users with high privileges. 2) Monitor and log all activities related to Power Platform administration and Dataverse usage to detect anomalous behavior indicative of exploitation attempts. 3) Apply the principle of least privilege rigorously to reduce the attack surface. 4) Until an official patch is released, consider isolating or segmenting Power Platform environments from critical network segments to limit potential lateral movement. 5) Review and harden the search path configurations and environment variables on systems hosting Microsoft Power Platform components to ensure only trusted directories are included. 6) Educate administrators and users with elevated privileges about the risks of this vulnerability and the importance of secure credential management. 7) Stay updated with Microsoft security advisories and apply patches promptly once available. 8) Conduct penetration testing and vulnerability assessments focused on Power Platform to identify any exploitation attempts or related weaknesses. These targeted actions go beyond generic advice by focusing on access control, environment hardening, and proactive monitoring specific to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-05-14T20:14:47.412Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec14c
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 6:12:56 PM
Last updated: 7/30/2025, 10:33:34 PM
Views: 16
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.