Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37337: CWE-197: Numeric Truncation Error in Microsoft Microsoft SQL Server 2017 (GDR)

0
High
VulnerabilityCVE-2024-37337cvecve-2024-37337cwe-197
Published: Tue Sep 10 2024 (09/10/2024, 16:53:39 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SQL Server 2017 (GDR)

Description

Microsoft SQL Server Native Scoring Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:11:17 UTC

Technical Analysis

CVE-2024-37337 is a numeric truncation error vulnerability classified under CWE-197 that affects Microsoft SQL Server 2017 (GDR) version 14.0.0. This vulnerability occurs due to improper handling of numeric data types within the SQL Server Native Scoring component, leading to truncation errors that can inadvertently disclose sensitive information. Specifically, the flaw allows an attacker with low privileges and network access to retrieve confidential scoring data that should otherwise be protected. The vulnerability does not require user interaction and does not affect the integrity or availability of the system, but it compromises confidentiality. The CVSS 3.1 base score of 7.1 indicates a high-severity issue with network attack vector, low attack complexity, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature suggests it could be leveraged in targeted attacks to extract sensitive data from vulnerable SQL Server instances. The lack of an official patch at the time of publication means organizations must rely on interim mitigations and monitoring until a fix is released.

Potential Impact

The primary impact of CVE-2024-37337 is unauthorized disclosure of sensitive information stored or processed by Microsoft SQL Server 2017 instances. This can lead to leakage of proprietary scoring data or other confidential metrics, potentially undermining business operations, competitive advantage, or compliance with data protection regulations. Since the vulnerability requires low privileges but network access, attackers who have gained limited access to the network or compromised low-privilege accounts could exploit this flaw to escalate information access. The limited impact on integrity and availability reduces the risk of data manipulation or service disruption, but the confidentiality breach alone can have serious consequences, including reputational damage and regulatory penalties. Organizations relying heavily on SQL Server 2017 for critical data processing are at elevated risk, particularly if they have not segmented or restricted database access adequately.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Restrict network access to SQL Server instances by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and users only. 3. Enforce the principle of least privilege by auditing and minimizing permissions granted to database users and service accounts, ensuring no unnecessary low-privilege accounts have network access. 4. Enable detailed logging and monitoring on SQL Server to detect unusual queries or access patterns that may indicate exploitation attempts. 5. Consider deploying database activity monitoring (DAM) solutions to provide real-time alerts on suspicious behavior related to scoring data or numeric data handling. 6. Conduct regular security assessments and penetration testing focused on database security controls to identify and remediate potential attack vectors. 7. Educate database administrators and security teams about this vulnerability and the importance of rapid patching and access control enforcement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-05T20:19:26.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c66b7ef31ef0b563ab2

Added to database: 2/25/2026, 9:40:54 PM

Last enriched: 2/26/2026, 5:11:17 AM

Last updated: 4/12/2026, 3:42:22 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses