Skip to content
Threat Feed
high advisory

CVE-2026-40417: Microsoft Dynamics Business Central Privilege Escalation

CVE-2026-40417 is a privilege escalation vulnerability affecting Microsoft Dynamics Business Central due to weak authentication, allowing an authorized attacker to elevate privileges locally.

CVE-2026-40417 describes a privilege escalation vulnerability within Microsoft Dynamics Business Central. The vulnerability stems from weak authentication mechanisms within the application, potentially allowing an attacker with valid, low-privileged credentials to elevate their access to higher levels within the system. Successful exploitation would grant the attacker unauthorized access to sensitive data, configuration settings, and administrative functions within the Business Central environment. This vulnerability was published on 2026-05-12.

Attack Chain

  1. The attacker gains initial access to the Dynamics Business Central application with a low-privileged user account.
  2. The attacker identifies an endpoint or function within Business Central that suffers from weak authentication.
  3. The attacker crafts a malicious request, exploiting the weak authentication to bypass privilege checks.
  4. The attacker’s request successfully authenticates as a higher-privileged user or role.
  5. The attacker accesses sensitive data and configuration settings that are normally restricted to higher-privileged users.
  6. The attacker modifies system settings or performs administrative actions, such as creating new user accounts or changing permissions.
  7. The attacker leverages the elevated privileges to further compromise the Business Central environment, potentially gaining control over critical business processes.

Impact

Successful exploitation of CVE-2026-40417 could allow an attacker to gain unauthorized access to sensitive financial data, customer information, and other business-critical resources within Microsoft Dynamics Business Central. This could lead to data breaches, financial losses, and disruption of business operations. The vulnerability allows local privilege escalation, which can be leveraged for lateral movement within the compromised environment.

Recommendation

  • Apply the security update provided by Microsoft to patch CVE-2026-40417 in Dynamics Business Central, as referenced in the Microsoft advisory.
  • Review and strengthen authentication mechanisms within Dynamics Business Central to prevent unauthorized privilege escalation.
  • Monitor process execution for unexpected privilege escalations using the “Detect Suspicious Dynamics Business Central Process Elevation” Sigma rule.
  • Enable logging for authentication events within Dynamics Business Central and correlate with unusual process creation as highlighted by the “Detect Suspicious Dynamics Business Central Authentication Followed by Process Creation” Sigma rule.

Detection coverage 2

Detect Suspicious Dynamics Business Central Process Elevation

high

Detects CVE-2026-40417 exploitation — Monitors process creation events for processes running with elevated privileges within Dynamics Business Central.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detect Suspicious Dynamics Business Central Authentication Followed by Process Creation

medium

Detects CVE-2026-40417 exploitation — Monitors for authentication events followed by process creation events within a short timeframe, which could indicate an attacker leveraging elevated privileges.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detection queries are available on the platform. Get full rules →