Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38225: CWE-287: Improper Authentication in Microsoft Microsoft Dynamics 365 Business Central 2023 Release Wave 1

0
High
VulnerabilityCVE-2024-38225cvecve-2024-38225cwe-287
Published: Tue Sep 10 2024 (09/10/2024, 16:53:56 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 Business Central 2023 Release Wave 1

Description

Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:56:18 UTC

Technical Analysis

CVE-2024-38225 is an elevation of privilege vulnerability identified in Microsoft Dynamics 365 Business Central 2023 Release Wave 1, specifically version 22.0.0. The root cause is improper authentication (CWE-287), which means the system fails to correctly verify user credentials or authorization levels, allowing an attacker with some level of access (low privileges) to escalate their privileges to higher levels, potentially administrative. The vulnerability requires no user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L) and only requires privileges at a low level (PR:L). The scope is unchanged (S:U), but the impact is severe across confidentiality, integrity, and availability (all rated high). This means an attacker could gain unauthorized access to sensitive business data, modify or delete critical information, or disrupt business operations. Although no public exploits are known yet, the high CVSS score (8.8) and the nature of the vulnerability make it a significant risk for organizations relying on this product version. The vulnerability was reserved in June 2024 and published in September 2024, but no patch links are currently provided, indicating that remediation may still be pending or in progress. Given the critical business functions handled by Dynamics 365 Business Central, this vulnerability could have widespread implications if exploited.

Potential Impact

The impact of CVE-2024-38225 is substantial for organizations using Microsoft Dynamics 365 Business Central 2023 Release Wave 1 (v22.0.0). Successful exploitation allows attackers with limited privileges to escalate their access, potentially gaining administrative control over the system. This can lead to unauthorized access to sensitive financial and operational data, manipulation or deletion of business records, and disruption of enterprise resource planning (ERP) functions. The compromise of such systems can result in financial losses, regulatory non-compliance, reputational damage, and operational downtime. Since Dynamics 365 Business Central is widely used by small to medium enterprises globally for critical business processes, the vulnerability poses a significant risk to supply chains and business continuity. The lack of known exploits currently reduces immediate risk, but the availability of detailed vulnerability information increases the likelihood of future exploitation attempts. Organizations that expose this service to the internet or have weak internal access controls are particularly vulnerable.

Mitigation Recommendations

1. Monitor Microsoft’s official channels closely for patches or security updates addressing CVE-2024-38225 and apply them immediately upon release. 2. Until a patch is available, restrict network access to Microsoft Dynamics 365 Business Central instances, especially from untrusted networks, using firewalls and network segmentation. 3. Enforce the principle of least privilege by reviewing and minimizing user permissions within Dynamics 365 Business Central to limit the potential impact of privilege escalation. 4. Implement multi-factor authentication (MFA) for all users accessing the system to reduce the risk of credential misuse. 5. Conduct regular audits and monitoring of user activities and privilege changes within the application to detect suspicious behavior early. 6. Use endpoint detection and response (EDR) tools to identify anomalous activities indicative of privilege escalation attempts. 7. Educate administrators and users about the risks and signs of exploitation related to privilege escalation vulnerabilities. 8. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block exploitation attempts targeting this vulnerability. 9. Maintain up-to-date backups of critical business data to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.225Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c74b7ef31ef0b56439a

Added to database: 2/25/2026, 9:41:08 PM

Last enriched: 2/28/2026, 3:56:18 AM

Last updated: 4/12/2026, 1:59:52 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses