Deserialization of Untrusted Data (CWE-502)
A Remote Code Execution vulnerability exists in Microsoft SharePoint, related to the deserialization of untrusted data. This high-severity vulnerability affects Microsoft SharePoint Server versions 2019, Subscription Edition, and 2016 Enterprise. It has a CVSS v3.1 base score of 7.2, indicating a significant risk.
This vulnerability allows an attacker to execute arbitrary code on the affected SharePoint server with potentially severe consequences. The impact includes high risks to confidentiality, integrity, and availability. A successful exploit could result in the attacker gaining the same privileges as the compromised SharePoint application, potentially leading to full control of the affected system. The vulnerability requires network access and high privileges but no user interaction, making it particularly dangerous for network-accessible systems.
There is no evidence that a public proof-of-concept exists. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list. Its exploitation has been reported by various sources, including securityonline.info.
A patch is available. Microsoft released a security update on July 9, 2024, to address this vulnerability. It is crucial to apply this patch as soon as possible to mitigate the risk.
1. Apply the Microsoft security update immediately. 2. Implement network segmentation and restrict access to SharePoint servers. 3. Monitor SharePoint servers for suspicious activities. 4. Keep SharePoint and related software up to date with the latest security patches. 5. Implement the principle of least privilege for SharePoint user accounts and services. 6. If immediate patching is not possible, consider temporarily disabling or isolating affected SharePoint servers until the patch can be applied.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
A CVSS base score of 7.2 has been assigned.
NVD published the first details for CVE-2024-38094
Feedly found the first article mentioning CVE-2024-38094. See article
Feedly estimated the CVSS score as HIGH
This CVE started to trend in security discussions
Detection for the vulnerability has been added to Nessus (202035)
EPSS Score was set to: 0.05% (Percentile: 19.6%)
Attacks in the wild have been reported by Cybersecurity News. See article
This CVE stopped trending in security discussions