Improper Privilege Management (CWE-269)
Microsoft SQL Server Elevation of Privilege Vulnerability. This is a network-based vulnerability with low attack complexity and requires low privileges to exploit. It does not require user interaction. The vulnerability has a high impact on confidentiality, integrity, and availability, with a CVSS base score of 8.8.
Successful exploitation could allow an attacker to elevate their privileges within the SQL Server environment, potentially gaining unauthorized access to sensitive data, modifying database contents, or disrupting database services. This vulnerability has a high impact on confidentiality, integrity, and availability.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft has released an official fix for this vulnerability on September 10, 2024.
1. Apply the official patch released by Microsoft as soon as possible. 2. Limit network access to SQL Server instances to trusted hosts and networks. 3. Implement the principle of least privilege for SQL Server user accounts. 4. Monitor SQL Server logs for suspicious activities. 5. Keep SQL Server and related systems up-to-date with the latest security patches.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (380469)
A CVSS base score of 8.8 has been assigned.
Feedly found the first article mentioning CVE-2024-37980. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-37980
EPSS Score was set to: 0.05% (Percentile: 20%)
Detection for the vulnerability has been added to Nessus (207068)
Detection for the vulnerability has been added to Nessus (207065)
EPSS Score was set to: 0.05% (Percentile: 20.6%)