Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Microsoft Patches Vulnerabilities in Power Platform, Imagine Cup Site

Microsoft has patched ‘critical’ privilege escalation and information disclosure vulnerabilities in Power Platform, Dataverse and the Imagine Cup website. 

Microsoft security

Microsoft on Tuesday announced patching potentially serious information disclosure and privilege escalation vulnerabilities in Power Platform and Dataverse, as well as the Imagine Cup website. 

The tech giant has assigned a maximum severity rating of ‘critical’ to each of the flaws, but based on their CVSS scores they are all high-severity issues. 

In Power Platform, a low-code platform designed for securing and managing apps, workflows and AI-powered tools, Microsoft fixed CVE-2024-38190, a missing authorization vulnerability that could have allowed an unauthenticated attacker to view sensitive information.

In Dataverse, a component of the Power Platform that lets users securely store and manage data used by business applications, the company addressed CVE-2024-38139, an improper authentication issue that could have been exploited by an authenticated attacker to elevate privileges. 

In the website for Imagine Cup, a competition for student startup founders who use AI technologies, Microsoft patched CVE-2024-38204, an improper access control issue that could have been leveraged by an authenticated attacker to elevate privileges. 

Because the issues have been fully mitigated server-side, users of the impacted services do not need to take any action. Microsoft has not found any evidence that they were exploited in the wild before they were patched, and details of the flaws have not been publicly disclosed. 

Advertisement. Scroll to continue reading.

Microsoft announced earlier this year that it has decided to assign CVE identifiers even to cloud service vulnerabilities that do not require any action from users, for transparency

However, the tech giant’s Security Update Guide and APIs have been updated to allow users to filter out these types of flaws in case they don’t want to waste any time or energy on them.

Related: Iranian Cyberspies Exploiting Recent Windows Kernel Vulnerability 

Related: Microsoft Confirms Exploited Zero-Day in Windows Management Console

Related: Microsoft Says Recent Windows Vulnerability Exploited as Zero-Day

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.