Microsoft Dynamics 365 SQL Injection Vulnerability
Summary
CERT-Bund has issued a security advisory for Microsoft Dynamics 365 Customer Engagement regarding a critical SQL injection vulnerability (CVSS 8.8). The vulnerability allows authenticated remote attackers to execute arbitrary SQL commands, potentially leading to privilege escalation or operating system command execution.
What changed
This advisory from CERT-Bund details a critical SQL injection vulnerability affecting Microsoft Dynamics 365 Customer Engagement, specifically version 1612 (9.0.2.3034). The vulnerability, rated with a CVSS Base Score of 8.8, allows authenticated remote attackers to execute arbitrary SQL commands. Successful exploitation could lead to privilege escalation or the execution of operating system commands.
Organizations using the affected version of Microsoft Dynamics 365 Customer Engagement should immediately review the mitigation strategies provided by Microsoft. While the advisory does not specify a compliance deadline, prompt patching or implementation of workarounds is crucial to prevent unauthorized access and potential data breaches. Failure to address this vulnerability could expose sensitive business data and compromise system integrity.
What to do next
- Review and apply Microsoft's security updates for Dynamics 365 Customer Engagement.
- Assess potential impact of the vulnerability on data security and system integrity.
- Implement recommended mitigation strategies provided by Microsoft.
Source document (simplified)
[WID-SEC-2026-0788] Microsoft Dynamics 365 Customer Engagement: Schwachstelle ermöglicht SQL-Injection CVSS Base Score 8.8 (hoch) CVSS Temporal Score 8.1 (hoch) Remoteangriff ja Datum 18.03.2026 Stand 19.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Windows
Produktbeschreibung
Microsoft Dynamics 365 ist eine All-in-One-Unternehmensmanagementlösung.
Produkte
18.03.2026
- Microsoft Dynamics 365 Customer Engagement 1612 (9.0.2.3034)
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Microsoft Dynamics 365 Customer Engagement ausnutzen, um beliebige SQL-Befehle auszuführen und möglicherweise seine Berechtigungen zu erweitern oder Betriebssystembefehle auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.