Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43460: CWE-285: Improper Authorization in Microsoft Dynamics 365 Business Central Online

0
High
VulnerabilityCVE-2024-43460cvecve-2024-43460cwe-285
Published: Tue Sep 17 2024 (09/17/2024, 18:15:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Dynamics 365 Business Central Online

Description

Improper authorization in Dynamics 365 Business Central resulted in a vulnerability that allows an authenticated attacker to elevate privileges over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:47:26 UTC

Technical Analysis

CVE-2024-43460 is a vulnerability identified in Microsoft Dynamics 365 Business Central Online, a cloud-based enterprise resource planning (ERP) solution widely used by organizations for financial and operational management. The root cause is improper authorization (CWE-285), meaning the system fails to correctly enforce access controls, allowing an authenticated user with limited privileges to escalate their permissions over the network. The vulnerability does not require user interaction and can be exploited remotely, increasing its risk profile. The CVSS v3.1 base score of 8.1 reflects a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), and the fact that only privileges are required (PR:L) without user interaction (UI:N). The impact affects integrity and availability (I:H, A:H), meaning attackers can alter data or disrupt services. Although no public exploits are known, the vulnerability's characteristics suggest that attackers could leverage it to gain unauthorized control, manipulate business-critical data, or cause denial-of-service conditions. The absence of specific affected versions and patch links indicates that the vulnerability may affect multiple or all current versions of the online service, emphasizing the need for vigilance. This vulnerability highlights the importance of strict authorization checks in cloud ERP platforms, where privilege escalation can have severe business consequences.

Potential Impact

The vulnerability poses a significant risk to organizations using Microsoft Dynamics 365 Business Central Online by enabling attackers with limited access to escalate privileges and potentially gain administrative control. This can lead to unauthorized modification or deletion of critical financial and operational data, disruption of business processes, and potential downtime affecting availability. The integrity of business records could be compromised, impacting compliance and audit requirements. Attackers could also leverage elevated privileges to move laterally within the organization's cloud environment, increasing the scope of compromise. Given the cloud-based nature of the product, the impact can extend beyond a single organization if attackers exploit the vulnerability to access shared resources or integrations. The high CVSS score and network exploitability mean that the threat could be leveraged in targeted attacks against enterprises, especially those with complex workflows and sensitive data managed through Dynamics 365 Business Central Online.

Mitigation Recommendations

1. Monitor Microsoft’s official security advisories closely for patches or updates addressing CVE-2024-43460 and apply them promptly once available. 2. In the interim, conduct a thorough review of user roles and permissions within Dynamics 365 Business Central Online to ensure the principle of least privilege is enforced, minimizing the number of users with elevated rights. 3. Implement enhanced logging and monitoring to detect unusual privilege escalation attempts or anomalous activities within the ERP environment. 4. Use conditional access policies and multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. 5. Segment and isolate critical business functions and data within the cloud environment to limit the potential impact of privilege escalation. 6. Educate administrators and users about the risks of privilege escalation and encourage prompt reporting of suspicious behavior. 7. Consider deploying additional security controls such as Web Application Firewalls (WAF) or Intrusion Detection/Prevention Systems (IDS/IPS) that can detect and block exploitation attempts at the network level. 8. Regularly audit and update access control policies to ensure they align with current organizational roles and responsibilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd8b7ef31ef0b5697da

Added to database: 2/25/2026, 9:42:48 PM

Last enriched: 2/26/2026, 7:47:26 AM

Last updated: 4/12/2026, 1:11:07 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses