Skip to main content

CVE-2024-35263: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

Medium
VulnerabilityCVE-2024-35263cvecve-2024-35263cwe-200
Published: Tue Jun 11 2024 (06/11/2024, 17:00:08 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 18:13:10 UTC

Technical Analysis

CVE-2024-35263 is a medium-severity vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. This vulnerability affects Microsoft Dynamics 365 (on-premises) version 9.1, specifically impacting version 9.0 as well. The flaw allows an attacker with low privileges (PR:L) and requiring user interaction (UI:R) to remotely exploit the system over the network (AV:N) with low attack complexity (AC:L). The vulnerability does not affect system integrity or availability but results in a high impact on confidentiality (C:H), meaning sensitive data can be disclosed without authorization. The scope is unchanged (S:U), so the vulnerability affects only the vulnerable component without extending to other components. The CVSS vector indicates that exploitation requires some level of authentication and user interaction, which somewhat limits the ease of exploitation but still poses a significant risk. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability likely arises from improper access control or insufficient data sanitization within the Dynamics 365 on-premises environment, allowing unauthorized users to access sensitive information that should be protected. Given the critical role of Dynamics 365 in managing customer data, financial records, and business processes, this information disclosure could lead to data breaches, regulatory non-compliance, and reputational damage.

Potential Impact

For European organizations, the exposure of sensitive information through this vulnerability could have serious consequences. Many enterprises and public sector entities in Europe rely on Microsoft Dynamics 365 for CRM and ERP functions, handling personal data protected under GDPR. Unauthorized disclosure of such data could lead to violations of data protection laws, resulting in heavy fines and legal actions. Confidential business information leakage could also undermine competitive advantage and trust with customers and partners. The requirement for authentication and user interaction reduces the risk of widespread automated exploitation but does not eliminate targeted attacks, especially insider threats or phishing campaigns that could trick legitimate users into triggering the vulnerability. The medium severity rating reflects a balance between the potential impact and the exploitation complexity, but the high confidentiality impact means organizations must prioritize remediation to avoid data breaches and compliance issues.

Mitigation Recommendations

European organizations should implement the following specific measures: 1) Immediately review and restrict user privileges in Dynamics 365 to the minimum necessary, reducing the pool of users who can exploit this vulnerability. 2) Conduct user awareness training to prevent social engineering or phishing attempts that could lead to the required user interaction for exploitation. 3) Monitor and audit access logs within Dynamics 365 for unusual or unauthorized data access patterns. 4) Apply any forthcoming security patches from Microsoft as soon as they become available. 5) If patching is delayed, consider deploying network-level controls such as web application firewalls (WAFs) to detect and block suspicious requests targeting Dynamics 365 endpoints. 6) Implement strict segmentation of the Dynamics 365 environment to limit exposure and isolate sensitive data. 7) Review and enhance data encryption both at rest and in transit within the Dynamics 365 infrastructure to mitigate data exposure risks. 8) Engage in regular vulnerability assessments and penetration testing focused on Dynamics 365 deployments to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.413Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec14e

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:13:10 PM

Last updated: 8/11/2025, 6:38:22 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats