CVE-2023-36433: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
Overview
- Severity
- Medium (CVSS 6.5)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
- Category
- Information Disclosure
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2023-Oct
- Released
- 2023-10-10
- EPSS Score
- 1.86% (percentile: 83.0%)
FAQ
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.
What updates do I need to install to be protected from this vulnerability?
Customers need to install the September 2023 Microsoft Dynamics 365 (on premises) security updates which are listed in the Security Updates table. Customers who have installed the September 2023 security updates are already protected from this vulnerability.
Affected Products (2)
Microsoft Dynamics
- Microsoft Dynamics 365 (on-premises) version 9.0
- Microsoft Dynamics 365 (on-premises) version 9.1
Security Updates (2)
Acknowledgments
<a href="https://www.linkedin.com/in/talha--gunay/">TALHA GÜNAY</a>
Revision History
- 2023-10-10: Information published. This CVE was addressed by updates that were released in September 2023, but the CVE was inadvertently omitted from the September 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Microsoft Dynamics 365 (on-premises) install the September 2023 updates to be protected from this vulnerability.