<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dynamics 365 (On-Premises) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dynamics-365-on-premises/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:42:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dynamics-365-on-premises/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-42898: Microsoft Dynamics 365 (on-premises) Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-dynamics365-code-injection/</link><pubDate>Tue, 12 May 2026 18:42:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dynamics365-code-injection/</guid><description>CVE-2026-42898 is a code injection vulnerability in Microsoft Dynamics 365 (on-premises) that allows an authorized attacker to execute arbitrary code over a network.</description><content:encoded><![CDATA[<p>CVE-2026-42898 is a critical code injection vulnerability affecting Microsoft Dynamics 365 (on-premises). This vulnerability allows an authorized attacker with network access to inject and execute arbitrary code on the affected system. The vulnerability stems from improper control of code generation within the Dynamics 365 application. Successful exploitation can lead to complete system compromise, data breaches, and unauthorized access to sensitive information. Defenders should prioritize patching and consider implementing detection measures to identify potential exploitation attempts. The vulnerability was published on 2026-05-12 and poses a significant threat to organizations using on-premises deployments of Dynamics 365.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authorized attacker gains network access to the Dynamics 365 (on-premises) environment.</li>
<li>The attacker authenticates to the Dynamics 365 application.</li>
<li>The attacker crafts a malicious request containing injected code.</li>
<li>The malicious request is sent to a vulnerable endpoint within the Dynamics 365 application.</li>
<li>The application improperly processes the request, leading to code generation based on the attacker-controlled input.</li>
<li>The injected code is executed within the context of the Dynamics 365 application.</li>
<li>The attacker gains control of the Dynamics 365 server.</li>
<li>The attacker leverages their access to compromise other systems on the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42898 allows an attacker to execute arbitrary code on the Microsoft Dynamics 365 (on-premises) server. This can lead to a complete compromise of the system, potentially affecting all data and processes managed by Dynamics 365. Impact includes data breaches, financial losses, and reputational damage. Given the widespread use of Dynamics 365 in managing customer relationships and business operations, a successful attack could have significant consequences for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by Microsoft to address CVE-2026-42898 as soon as possible to prevent exploitation.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts in real-time.</li>
<li>Monitor network traffic for suspicious requests to Dynamics 365 servers, specifically looking for patterns indicative of code injection (see Sigma rules).</li>
<li>Review user access controls within Dynamics 365 to ensure least privilege and limit the impact of potential compromises.</li>
<li>Implement web application firewall (WAF) rules to filter out malicious requests targeting Dynamics 365.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>code injection</category><category>dynamics 365</category><category>cve-2026-42898</category><category>web application</category><category>execution</category></item><item><title>CVE-2026-42833: Microsoft Dynamics 365 (on-premises) Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-dynamics365-rce/</link><pubDate>Tue, 12 May 2026 18:42:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dynamics365-rce/</guid><description>CVE-2026-42833 is a critical vulnerability in Microsoft Dynamics 365 (on-premises) allowing an authorized attacker with high privileges to execute arbitrary code over the network due to execution with unnecessary privileges.</description><content:encoded><![CDATA[<p>CVE-2026-42833 is a critical vulnerability affecting Microsoft Dynamics 365 (on-premises). The vulnerability stems from a flaw in the software that permits execution with unnecessary privileges, potentially enabling a high-privileged authorized attacker to execute arbitrary code remotely over a network. Successful exploitation of this vulnerability would allow the attacker to perform unauthorized actions, potentially leading to complete system compromise, data theft, or denial of service. This vulnerability poses a significant risk to organizations utilizing the on-premises version of Dynamics 365, requiring immediate patching and mitigation measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authorized attacker gains high-privileged access to a Dynamics 365 (on-premises) instance. This could be achieved through compromised credentials or an insider threat.</li>
<li>The attacker leverages the vulnerability (CVE-2026-42833), exploiting the flaw that allows execution with unnecessary privileges.</li>
<li>The attacker crafts a malicious request to trigger the execution of arbitrary code within the Dynamics 365 server environment.</li>
<li>The crafted request is sent over the network to the Dynamics 365 server, exploiting a network-accessible component.</li>
<li>The Dynamics 365 server processes the request, unintentionally executing the attacker&rsquo;s malicious code due to the privilege escalation vulnerability.</li>
<li>The attacker&rsquo;s code executes within the security context of the Dynamics 365 application, potentially gaining elevated privileges.</li>
<li>With elevated privileges, the attacker can perform a variety of malicious actions, such as installing malware, exfiltrating sensitive data, or manipulating system configurations.</li>
<li>The attacker achieves the objective of remote code execution, leading to full control over the Dynamics 365 server and potential compromise of the entire network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42833 can lead to complete compromise of the Microsoft Dynamics 365 (on-premises) server. An attacker can gain full control over the system, allowing them to steal sensitive data, install malware, disrupt business operations, and potentially pivot to other systems on the network. The vulnerability affects organizations that use the on-premises version of Dynamics 365.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately apply the security update released by Microsoft to address CVE-2026-42833 as detailed in the Microsoft Security Response Center advisory.</li>
<li>Monitor network traffic for suspicious activity indicative of exploitation attempts targeting Dynamics 365 servers, using network intrusion detection systems.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune it to detect potential exploitation attempts of CVE-2026-42833 based on process creation events.</li>
<li>Enforce the principle of least privilege to limit the impact of compromised accounts as it restricts lateral movement and code execution.</li>
<li>Review and audit user permissions within Dynamics 365 to ensure that no users have unnecessary elevated privileges, reducing the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>remote code execution</category><category>dynamics 365</category></item></channel></rss>