Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35260: CWE-426: Untrusted Search Path in Microsoft Microsoft Power Platform

0
High
VulnerabilityCVE-2024-35260cvecve-2024-35260cwe-426
Published: Thu Jun 27 2024 (06/27/2024, 17:32:27 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Power Platform

Description

An authenticated attacker can exploit an untrusted search path vulnerability in Microsoft Dataverse to execute code over a network.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:44:17 UTC

Technical Analysis

CVE-2024-35260 is an untrusted search path vulnerability (CWE-426) identified in Microsoft Power Platform's Dataverse component. This vulnerability allows an authenticated attacker with high privileges to execute arbitrary code remotely over a network. The root cause lies in the way the software resolves file paths or executable locations without properly validating or restricting the search path, enabling an attacker to insert or influence malicious binaries or scripts that get executed in place of legitimate ones. The vulnerability affects the confidentiality, integrity, and availability of the affected systems because arbitrary code execution can lead to data theft, system manipulation, or denial of service. The CVSS v3.1 score of 8.0 reflects a high severity, with attack vector being network-based, requiring high complexity and privileges but no user interaction. The scope is changed, indicating that exploitation can affect resources beyond the initially vulnerable component. Although no public exploits are currently known, the vulnerability's nature and the widespread use of Microsoft Power Platform in enterprise environments make it a significant risk. The lack of specified affected versions suggests that the vulnerability may impact multiple or all current versions until patched. The vulnerability was reserved in May 2024 and published in late June 2024, indicating recent discovery and disclosure. The absence of patch links means organizations must monitor Microsoft advisories closely for updates. The vulnerability is particularly concerning because Microsoft Power Platform is widely used for building business applications and workflows, meaning exploitation could disrupt critical business processes.

Potential Impact

For European organizations, the impact of CVE-2024-35260 can be substantial. Microsoft Power Platform is extensively used across Europe for custom business applications, automation, and data management. Exploitation could lead to unauthorized code execution within enterprise environments, potentially resulting in data breaches, manipulation of business-critical workflows, and service disruptions. Confidentiality is at risk due to possible data exfiltration, integrity can be compromised by unauthorized changes to data or processes, and availability may be affected if systems are taken offline or corrupted. The requirement for authenticated access with high privileges limits the attack surface but also means insider threats or compromised privileged accounts pose a significant risk. Organizations with complex deployments or integrations with other systems may face cascading effects. Regulatory compliance impacts, such as GDPR violations due to data breaches, could lead to legal and financial penalties. The high severity score underscores the need for urgent attention to this vulnerability in European enterprises relying on Microsoft Power Platform.

Mitigation Recommendations

To mitigate CVE-2024-35260 effectively, European organizations should: 1) Immediately review and restrict access to Microsoft Power Platform environments, ensuring that only necessary users have high privilege levels. 2) Audit and harden environment variables and system PATH configurations on servers and workstations running Power Platform components to prevent untrusted path influence. 3) Implement strict application whitelisting and code integrity policies to block unauthorized binaries or scripts from executing. 4) Monitor logs and alerts for unusual activity related to Power Platform, especially focusing on privilege escalations or unexpected code execution attempts. 5) Prepare for rapid deployment of official patches or updates from Microsoft once released, including testing in controlled environments. 6) Educate administrators and developers about the risks of untrusted search paths and enforce secure coding and deployment practices. 7) Consider network segmentation to isolate critical Power Platform components from less trusted network zones. 8) Use multi-factor authentication and enhanced monitoring on accounts with high privileges to reduce risk of credential compromise. These targeted actions go beyond generic advice and address the specific exploitation vector and environment of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.412Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec14c

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/17/2025, 11:44:17 PM

Last updated: 1/19/2026, 7:58:41 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats