Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37323: CWE-190: Integer Overflow or Wraparound in Microsoft Microsoft SQL Server 2017 (GDR)

0
High
VulnerabilityCVE-2024-37323cvecve-2024-37323cwe-190
Published: Tue Jul 09 2024 (07/09/2024, 17:02:50 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft SQL Server 2017 (GDR)

Description

SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 12/10/2025, 00:13:15 UTC

Technical Analysis

CVE-2024-37323 is an integer overflow or wraparound vulnerability (CWE-190) identified in Microsoft SQL Server 2017 (GDR), specifically within the SQL Server Native Client OLE DB Provider component. This vulnerability arises when the software improperly handles integer values, causing an overflow that can be exploited by an attacker to execute arbitrary code remotely. The vulnerability is remotely exploitable over the network without requiring any privileges (AV:N/PR:N) but does require user interaction (UI:R), such as convincing a user to connect to a malicious server or open a crafted file. Successful exploitation can lead to complete compromise of the affected SQL Server instance, impacting confidentiality, integrity, and availability of the database and potentially the underlying host system. The CVSS v3.1 base score is 8.8, reflecting a high severity with critical impacts. No public exploits are known at this time, but the vulnerability is publicly disclosed and should be considered a significant risk. The lack of available patches at the time of disclosure means organizations must rely on interim mitigations until updates are released. The vulnerability affects version 14.0.0 of SQL Server 2017 (GDR), a widely deployed database platform in enterprise environments.

Potential Impact

For European organizations, this vulnerability presents a substantial risk due to the widespread use of Microsoft SQL Server 2017 in business-critical applications, including finance, healthcare, government, and manufacturing sectors. Exploitation could lead to unauthorized data access, data corruption, or complete service disruption, severely affecting business operations and compliance with data protection regulations such as GDPR. The ability to execute remote code without privileges increases the attack surface, especially in environments where SQL Server instances are exposed to untrusted networks or where user interaction with external content is common. The potential for ransomware deployment or data exfiltration following exploitation could result in significant financial and reputational damage. Organizations operating critical infrastructure or handling sensitive personal data are particularly vulnerable to cascading effects from such an attack.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available to address CVE-2024-37323. 2. Until patches are released, restrict network exposure of SQL Server 2017 instances by implementing strict firewall rules and network segmentation to limit access only to trusted hosts and users. 3. Disable or restrict the use of the SQL Server Native Client OLE DB Provider where feasible, or configure it to reject untrusted connections. 4. Educate users about the risks of interacting with untrusted content that could trigger the vulnerability, reducing the likelihood of required user interaction exploitation. 5. Implement robust monitoring and logging of SQL Server activities to detect anomalous behavior indicative of exploitation attempts. 6. Employ application whitelisting and endpoint protection solutions capable of detecting and blocking suspicious code execution. 7. Conduct regular security assessments and penetration testing focused on database security to identify and remediate potential attack vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-05T20:19:26.774Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb642

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 12/10/2025, 12:13:15 AM

Last updated: 1/19/2026, 9:54:56 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats