CVE-2022-23274: Microsoft Dynamics GP Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2022-Feb
- Released
- 2022-02-08
- Last Updated
- 2022-03-08
- EPSS Score
- 5.50% (percentile: 90.2%)
FAQ
How could an attacker exploit this vulnerability?
An authenticated user could send a specially crafted SQL request to a Dynamics GP Web Service and perform remote code execution.
According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of availability (A:H)? What does that mean for this vulnerability?
An attacker could impact availability of the data by assuming control of the server through remote code execution.
Affected Products (1)
Microsoft Dynamics
Security Updates (1)
Acknowledgments
Ha Anh Hoang with <a href="https://viettelcybersecurity.com/">Viettel Cyber Security</a>
Revision History
- 2022-02-08: Information published.
- 2022-03-08: Added an FAQ and updated the CVSS score. This is an informational change only.