CVE-2022-23274: Microsoft Dynamics GP Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Feb
Released
2022-02-08
Last Updated
2022-03-08
EPSS Score
5.50% (percentile: 90.2%)

FAQ

How could an attacker exploit this vulnerability? An authenticated user could send a specially crafted SQL request to a Dynamics GP Web Service and perform remote code execution. According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of availability (A:H)? What does that mean for this vulnerability? An attacker could impact availability of the data by assuming control of the server through remote code execution.

Affected Products (1)

Microsoft Dynamics

  • Microsoft Dynamics GP

Security Updates (1)

Acknowledgments

Ha Anh Hoang with <a href="https://viettelcybersecurity.com/">Viettel Cyber Security</a>

Revision History

  • 2022-02-08: Information published.
  • 2022-03-08: Added an FAQ and updated the CVSS score. This is an informational change only.