Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

CISA Confirms Microsoft Partner Center Flaw Exploited In Attacks

CRN by CRN
February 25, 2025
Home News
Share on FacebookShare on Twitter


The ‘critical’ vulnerability in Microsoft’s partner program website can ‘pose significant risks,’ the U.S. cybersecurity agency says.

A “critical” vulnerability potentially affecting users of Microsoft’s partner program website has seen exploitation in cyberattacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed Tuesday.

The flaw (tracked at CVE-2024-49035) impacts Partner.Microsoft.com, and was initially disclosed in November 2024.

[Related: 10 Major Ransomware Attacks And Data Breaches In 2024]

Microsoft had previously marked the vulnerability as “exploited” in its online advisory. However, CISA disclosed Tuesday that based on “evidence of active exploitation,” the agency has now added the flaw to its catalog of exploited vulnerabilities.

CRN has reached out to Microsoft for comment.

The improper access control flaw can be exploited by a threat actor to elevate their privileges on a network — in this case, the Microsoft partner center website — without authentication, according to Microsoft.

Users of the partner center website, however, “do not need to take any action because releases are rolled out automatically over several days,” Microsoft said in the previous advisory about the vulnerability posted in November.

Microsoft had previously said in its advisory that the flaw only impacts the online version of Microsoft Power Apps.

The vulnerability has received a severity score of 9.8 out 10.0 from the National Vulnerability Database, making it a “critical” issue.

“These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” CISA said in its advisory posted online Tuesday.



Source link

Tags: CyberattacksCybersecurityVulnerabilities
CRN

CRN

Next Post
IBM To Buy DataStax, Expand Watsonx AI Portfolio’s Data Management Capabilities

IBM To Buy DataStax, Expand Watsonx AI Portfolio’s Data Management Capabilities

Recommended.

Somos Achieves SOC 2 Type II Compliance, Ensuring Robust Security Standards

Somos Achieves SOC 2 Type II Compliance, Ensuring Robust Security Standards

January 7, 2025
Infortrend Introduces Innovative Parallel File Storage EonStor GSx to Accelerate HPC and AI Workloads

Infortrend Introduces Innovative Parallel File Storage EonStor GSx to Accelerate HPC and AI Workloads

April 10, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio