CVE-2022-41127: Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.5)
- CVSS Vector
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2022-Dec
- Released
- 2022-12-13
- Last Updated
- 2023-10-10
- EPSS Score
- 1.74% (percentile: 82.5%)
FAQ
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). Can the exploit move from Dynamics NAV to the underlying operating system?
Yes. An attacker who successfully exploited this vulnerability in Dynamics NAV could execute code on the host server in the context of the service account Dynamics has been configured to use.
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
The attacker must be authenticated to be able to exploit this vulnerability.
According to the CVSS metric, the attack vector is network (AV:N). What is the target used in the context of the remote code execution?
The Dynamics NAV opened port could be used to connect with the WCF TCP protocol. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
Affected Products (13)
Microsoft Dynamics
- Microsoft Dynamics NAV 2016
- Microsoft Dynamics NAV 2017
- Microsoft Dynamics NAV 2018
- Microsoft Dynamics NAV 2015
- Dynamics 365 Business Central Spring 2019 Update
- Dynamics 365 Business Central 2019 Release Wave 2 (On-Premise)
- Microsoft Dynamics 365 Business Central 2020 Release Wave 2
- Microsoft Dynamics 365 Business Central 2020 Release Wave 1
- Microsoft Dynamics 365 Business Central 2022 Release Wave 1
- Microsoft Dynamics 365 Business Central 2021 Release Wave 2
- Microsoft Dynamics 365 Business Central 2022 Release Wave 2
- Microsoft Dynamics 365 Business Central 2021 Release Wave 1
- Microsoft Dynamics NAV 2013 R2
Security Updates (12)
Acknowledgments
Yiming Xiang with <a href="https://www.nsfocus.cn/">NSFOCUS TIANJI LAB</a>
Revision History
- 2022-12-13: Information published.
- 2022-12-20: Corrected Download and Article links in the Security Updates table. This is an informational change only.
- 2023-03-14: In the Security Updates table, added the following supported editions of Microsoft Dynamics NAV as they are affected by this vulnerability: Microsoft Dynamics NAV 2013 R2 and Microsoft Dynamics NAV 2015. Microsoft strongly recommends that customers install the updates to be fully protected from this vulnerability.
- 2023-10-10: Corrected security updates table. This is an informational change only.