Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.SMB_NT_MS24_SEP_MICROSOFT_DYNAMICS_365_BC.NASL
HistorySep 11, 2024 - 12:00 a.m.

Security Updates for Microsoft Dynamics 365 Business Central (September 2024)

2024-09-1100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
microsoft dynamics 365 business central
security updates
privilege escalation vulnerability
cve-2024-38225
mskb-5042528
mskb-5042529
mskb-5042530
msft-ms24-5042528
msft-ms24-5042529
msft-ms24-5042530
nessus
authentication
remote attacker
administrator access
cvss score 9.8
2024/09/10
update
version 22.16
23.10
24.4

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

58.1%

The Microsoft Dynamics 365 Business Central install is missing security updates. It is, therefore, affected by a privilege escalation vulnerability. An authenticated, remote attacker can exploit this to gain privileged or administrator access to the system.

Note that Nessus has not attempted to exploit this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(206974);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/18");

  script_cve_id("CVE-2024-38225");
  script_xref(name:"MSKB", value:"5042528");
  script_xref(name:"MSKB", value:"5042529");
  script_xref(name:"MSKB", value:"5042530");
  script_xref(name:"MSFT", value:"MS24-5042528");
  script_xref(name:"MSFT", value:"MS24-5042529");
  script_xref(name:"MSFT", value:"MS24-5042530");
  script_xref(name:"IAVA", value:"2024-A-0560");

  script_name(english:"Security Updates for Microsoft Dynamics 365 Business Central (September 2024)");

  script_set_attribute(attribute:"synopsis", value:
"The Microsoft Dynamics 365 Business Central install is missing a security update.");
  script_set_attribute(attribute:"description", value:
"The Microsoft Dynamics 365 Business Central install is missing security updates. It is, therefore, affected by a
privilege escalation vulnerability. An authenticated, remote attacker can exploit this to gain privileged or
administrator access to the system.

Note that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported
version number.");
  script_set_attribute(attribute:"see_also", value:"http://support.microsoft.com/kb/5042528");
  script_set_attribute(attribute:"see_also", value:"http://support.microsoft.com/kb/5042529");
  script_set_attribute(attribute:"see_also", value:"http://support.microsoft.com/kb/5042530");
  script_set_attribute(attribute:"solution", value:
"Update Microsoft Dynamics 365 Business Central to 22.16 for 2023 Release Wave 1, 23.10 for 2023 Release Wave 2, 
24.4 for 2024 Release Wave 1, or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-38225");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/09/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/09/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/09/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:dynamics_365");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows : Microsoft Bulletins");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("microsoft_dynamics_365_business_central_server_win_installed.nbin");
  script_require_keys("installed_sw/Microsoft Dynamics 365 Business Central Server");
  script_require_ports(139, 445);

  exit(0);
}

include('vcf.inc');

var app = 'Microsoft Dynamics 365 Business Central Server';

var app_info = vcf::get_app_info(app:app, win_local:TRUE);

var constraints = [
  { 'min_version' : '22.0', 'fixed_version' : '22.0.64727.0', 'fixed_display' : 'Update 22.16 for Microsoft Dynamics 365 Business Central 2023 Release Wave 1' },
  { 'min_version' : '23.0', 'fixed_version' : '23.0.22561.0', 'fixed_display' : 'Update 23.10 for Microsoft Dynamics 365 Business Central 2023 Release Wave 2' },
  { 'min_version' : '24.0', 'fixed_version' : '24.0.22865.0', 'fixed_display' : 'Update 24.4 for Microsoft Dynamics 365 Business Central 2024 Release Wave 1' }
];

vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_HOLE
);

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

58.1%

Related for SMB_NT_MS24_SEP_MICROSOFT_DYNAMICS_365_BC.NASL