Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37337: CWE-197: Numeric Truncation Error in Microsoft Microsoft SQL Server 2017 (GDR)

0
High
VulnerabilityCVE-2024-37337cvecve-2024-37337cwe-197
Published: Tue Sep 10 2024 (09/10/2024, 16:53:39 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SQL Server 2017 (GDR)

Description

CVE-2024-37337 is a high-severity numeric truncation error vulnerability in Microsoft SQL Server 2017 (GDR) that can lead to information disclosure. The flaw arises from improper handling of numeric data, causing sensitive scoring information to be exposed. Exploitation requires network access and low-level privileges but no user interaction. While no known exploits are currently reported in the wild, the vulnerability poses a significant risk to confidentiality with limited impact on integrity and availability. Organizations running affected SQL Server versions should prioritize patching once available and implement strict access controls. Countries with widespread use of Microsoft SQL Server 2017, especially those with critical infrastructure relying on this database platform, face higher risk. The vulnerability’s CVSS score of 7. 1 reflects its high impact and ease of exploitation under certain conditions. Defenders must monitor for updates and restrict database access to mitigate potential attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:11:17 UTC

Technical Analysis

CVE-2024-37337 is a numeric truncation error vulnerability classified under CWE-197 that affects Microsoft SQL Server 2017 (GDR) version 14.0.0. This vulnerability occurs due to improper handling of numeric data types within the SQL Server Native Scoring component, leading to truncation errors that can inadvertently disclose sensitive information. Specifically, the flaw allows an attacker with low privileges and network access to retrieve confidential scoring data that should otherwise be protected. The vulnerability does not require user interaction and does not affect the integrity or availability of the system, but it compromises confidentiality. The CVSS 3.1 base score of 7.1 indicates a high-severity issue with network attack vector, low attack complexity, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature suggests it could be leveraged in targeted attacks to extract sensitive data from vulnerable SQL Server instances. The lack of an official patch at the time of publication means organizations must rely on interim mitigations and monitoring until a fix is released.

Potential Impact

The primary impact of CVE-2024-37337 is unauthorized disclosure of sensitive information stored or processed by Microsoft SQL Server 2017 instances. This can lead to leakage of proprietary scoring data or other confidential metrics, potentially undermining business operations, competitive advantage, or compliance with data protection regulations. Since the vulnerability requires low privileges but network access, attackers who have gained limited access to the network or compromised low-privilege accounts could exploit this flaw to escalate information access. The limited impact on integrity and availability reduces the risk of data manipulation or service disruption, but the confidentiality breach alone can have serious consequences, including reputational damage and regulatory penalties. Organizations relying heavily on SQL Server 2017 for critical data processing are at elevated risk, particularly if they have not segmented or restricted database access adequately.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Restrict network access to SQL Server instances by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts and users only. 3. Enforce the principle of least privilege by auditing and minimizing permissions granted to database users and service accounts, ensuring no unnecessary low-privilege accounts have network access. 4. Enable detailed logging and monitoring on SQL Server to detect unusual queries or access patterns that may indicate exploitation attempts. 5. Consider deploying database activity monitoring (DAM) solutions to provide real-time alerts on suspicious behavior related to scoring data or numeric data handling. 6. Conduct regular security assessments and penetration testing focused on database security controls to identify and remediate potential attack vectors. 7. Educate database administrators and security teams about this vulnerability and the importance of rapid patching and access control enforcement.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-05T20:19:26.777Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c66b7ef31ef0b563ab2

Added to database: 2/25/2026, 9:40:54 PM

Last enriched: 2/26/2026, 5:11:17 AM

Last updated: 2/26/2026, 7:31:12 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats