CVE-2024-21380
vulnerability analysis and mitigation

Overview

Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability (CVE-2024-21380) affects multiple versions of Microsoft Dynamics 365 Business Central, including 2022 Release Wave 2 and 2023 Release Wave 1. The vulnerability was initially disclosed on February 13, 2024, and has received multiple updates since then (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 Base Score of 8.0 (HIGH) with the following vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H. This indicates that the vulnerability requires network access, has high attack complexity, requires low privileges, and user interaction. The scope is changed, with potential high impacts on confidentiality, integrity, and availability (NVD).

Impact

The vulnerability is classified as an information disclosure vulnerability (CWE-200), which could potentially expose sensitive information to unauthorized actors. The high CVSS score indicates significant potential impact on system security (NVD).

Mitigation and workarounds

Microsoft has released updates to address this vulnerability across multiple versions of Dynamics 365 Business Central. Updates are available for both 2022 Release Wave 2 (Update 21.16) and 2023 Release Wave 1 (Update 22.10). Users are advised to install the latest updates to mitigate the vulnerability (Microsoft Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management