
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2024-38094) was initially disclosed on July 9, 2024, affecting multiple SharePoint products including SharePoint Server Subscription Edition, SharePoint Server 2016 Enterprise, and SharePoint Server 2019. The vulnerability was later added to CISA's Known Exploited Vulnerabilities (KEV) catalog on October 22, 2024, indicating its active exploitation in the wild (Censys).
The vulnerability is classified as a remote code execution flaw with a CVSS v3.1 base score of 7.2 (High), characterized by the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. It stems from a deserialization issue where the product deserializes untrusted data without sufficiently verifying that the resulting data will be valid, categorized under CWE-502 (Deserialization of Untrusted Data) (NVD).
When successfully exploited, the vulnerability allows attackers to gain unauthorized access to SharePoint servers, install malicious tools, disable security defenses, and move laterally across the network, potentially compromising the entire domain. The risk is particularly significant as SharePoint servers are often configured to be internet-facing to support remote access and collaboration (Censys).
Microsoft has released security updates to address this vulnerability. Organizations are advised to apply the available patches immediately. When SharePoint servers must be internet-facing, additional security measures are recommended, including implementing VPN or Zero Trust access, enforcing multi-factor authentication, regularly applying patches, and utilizing web application firewalls (Microsoft Support).
The severity of the vulnerability is reflected in its inclusion in CISA's KEV catalog, requiring federal agencies to apply mitigations by November 12, 2024. Censys reports observing 486,182 exposed Microsoft SharePoint instances online, with 74% located in the United States, highlighting the widespread potential impact of this vulnerability (Censys).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”