Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38164: CWE-284: Improper Access Control in Microsoft GroupMe

0
Critical
VulnerabilityCVE-2024-38164cvecve-2024-38164cwe-284
Published: Tue Jul 23 2024 (07/23/2024, 21:26:49 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: GroupMe

Description

An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:46:24 UTC

Technical Analysis

CVE-2024-38164 is an improper access control vulnerability classified under CWE-284 found in Microsoft GroupMe, a popular messaging platform. This vulnerability enables an unauthenticated attacker to escalate privileges over a network by convincing a user to click on a maliciously crafted link. The attack vector is network-based with no authentication required, but it does require user interaction, specifically clicking the malicious link. The vulnerability allows the attacker to bypass access control mechanisms, potentially granting them elevated privileges within the GroupMe environment or associated Microsoft services. The CVSS 3.1 base score of 9.6 reflects critical severity, with high impact on confidentiality, integrity, and availability, and a scope change indicating that the attacker can affect resources beyond their initial privileges. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to its ease of exploitation and potential impact. The lack of specified affected versions suggests the vulnerability may affect multiple or all current versions of GroupMe until patched. The vulnerability was reserved in June 2024 and published in July 2024, with enrichment from CISA indicating recognition by US cybersecurity authorities. The absence of patch links implies that a fix may not yet be publicly available, increasing urgency for mitigation.

Potential Impact

For European organizations, this vulnerability could lead to severe consequences including unauthorized access to sensitive communications, data leakage, and potential lateral movement within corporate networks if GroupMe is integrated with other Microsoft services. The critical severity and network-based exploitation mean attackers can operate remotely without credentials, increasing the attack surface. Confidentiality breaches could expose private conversations and corporate secrets, while integrity and availability impacts could disrupt communication workflows, affecting business continuity. Organizations relying on GroupMe for internal or external communication, especially in regulated sectors like finance, healthcare, and government, face heightened risks of compliance violations and reputational damage. The requirement for user interaction means social engineering campaigns could be effective, necessitating robust user training and awareness. The lack of known exploits currently provides a window for proactive defense, but the critical nature demands immediate attention.

Mitigation Recommendations

European organizations should implement targeted mitigation strategies beyond generic advice: 1) Educate users specifically about the risks of clicking unsolicited or suspicious links within GroupMe messages, emphasizing this vulnerability. 2) Employ advanced email and messaging filtering solutions that can detect and block malicious URLs before reaching users. 3) Restrict or monitor the use of GroupMe within corporate environments, especially on devices handling sensitive data, until patches are available. 4) Implement network segmentation to limit potential lateral movement if an account is compromised via GroupMe. 5) Monitor GroupMe usage logs and network traffic for unusual activities indicative of exploitation attempts. 6) Coordinate with Microsoft support channels to obtain and deploy patches promptly once released. 7) Consider deploying endpoint protection solutions capable of detecting exploitation behaviors related to privilege escalation. 8) Review and tighten access control policies related to GroupMe and associated Microsoft services to minimize privilege exposure. 9) Establish incident response plans specifically addressing social engineering and privilege escalation attacks via messaging platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.211Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb312

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 2/11/2026, 10:46:24 AM

Last updated: 3/26/2026, 4:00:06 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses