Skip to main content

CVE-2024-35260: CWE-426: Untrusted Search Path in Microsoft Microsoft Power Platform

High
VulnerabilityCVE-2024-35260cvecve-2024-35260cwe-426
Published: Thu Jun 27 2024 (06/27/2024, 17:32:27 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Power Platform

Description

An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:12:56 UTC

Technical Analysis

CVE-2024-35260 is a high-severity vulnerability classified under CWE-426 (Untrusted Search Path) affecting Microsoft Power Platform, specifically Microsoft Dataverse. The vulnerability allows an authenticated attacker with high privileges to exploit the untrusted search path issue to execute arbitrary code remotely over a network. An untrusted search path vulnerability occurs when an application or service loads executable files or libraries from directories that are not securely controlled, allowing an attacker to place malicious files in those directories. When the application subsequently loads these files, it inadvertently executes the attacker's code. In this case, the vulnerability resides within Microsoft Dataverse, a core component of the Power Platform used for data storage and management. The attacker must have authenticated access with high privileges, indicating that the attacker could be an insider or someone who has already compromised a user account with elevated rights. The CVSS v3.1 base score is 8.0 (high), with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), high privileges required (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is high, meaning the attacker can fully compromise the system, execute arbitrary code, and potentially pivot to other systems. No known exploits are reported in the wild yet, and no specific affected versions are listed, suggesting the vulnerability may affect multiple or all versions of Microsoft Power Platform until patched. No patch links are currently provided, indicating that remediation may still be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities that rely on Microsoft Power Platform and Dataverse for critical business applications and data management. Successful exploitation could lead to unauthorized code execution within the network, potentially resulting in data breaches, disruption of business processes, and lateral movement within corporate networks. Given the high privileges required, the threat is more likely to be exploited by malicious insiders or attackers who have already gained elevated access. However, once exploited, the attacker could compromise sensitive personal data protected under GDPR, leading to regulatory penalties and reputational damage. The network-based attack vector increases the risk of widespread impact across interconnected systems. The change in scope means that the vulnerability could affect components beyond the initially targeted system, amplifying the potential damage. The lack of user interaction requirement facilitates automated exploitation once access is obtained. Overall, the vulnerability could disrupt operations, compromise data integrity, and expose organizations to compliance violations.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Immediately audit and restrict privileged access to Microsoft Power Platform and Dataverse environments to minimize the number of users with high privileges. 2) Monitor and log all activities related to Power Platform administration and Dataverse usage to detect anomalous behavior indicative of exploitation attempts. 3) Apply the principle of least privilege rigorously to reduce the attack surface. 4) Until an official patch is released, consider isolating or segmenting Power Platform environments from critical network segments to limit potential lateral movement. 5) Review and harden the search path configurations and environment variables on systems hosting Microsoft Power Platform components to ensure only trusted directories are included. 6) Educate administrators and users with elevated privileges about the risks of this vulnerability and the importance of secure credential management. 7) Stay updated with Microsoft security advisories and apply patches promptly once available. 8) Conduct penetration testing and vulnerability assessments focused on Power Platform to identify any exploitation attempts or related weaknesses. These targeted actions go beyond generic advice by focusing on access control, environment hardening, and proactive monitoring specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.412Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec14c

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:12:56 PM

Last updated: 7/30/2025, 10:33:34 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats