CVE-2020-16860Improper Input Validation in Microsoft Dynamics 365 Version 9.0

Severity
8.8HIGHNVD
CNA6.8
EPSS
2.9%
top 13.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11
Latest updateMay 24

Description

A remote code execution vulnerability exists in Microsoft Dynamics 365 (on-premises) when the server fails to properly sanitize web requests to an affected Dynamics server. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SQL service account. An authenticated attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable Dynamics server. The security update addresses the vulnerability by correcting how Micro

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-94j9-g7hv-h89v: A remote code execution vulnerability exists in Microsoft Dynamics 365 (on-premises) when the server fails to properly sanitize web requests to an aff2022-05-24
CVEList
Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability2020-09-11

📋Vendor Advisories

1
Microsoft
Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability2020-09-08
CVE-2020-16860 — Improper Input Validation in Microsoft | cvebase