Open Nav
Sign Up

Microsoft Partner Center Improper Access Control Vulnerability (CVE-2024-49035)

CVE-2024-49035

Filip Dimitrov

February 27, 2025

A critical access control flaw (CVE-2024-49035) in Microsoft Partner Center allows attackers to gain unauthorized privileges, posing a major security risk.

Overview

Microsoft disclosed this high-severity vulnerability (CVSS 8.7 from Microsoft, 9.8 from NIST), which affects the Partner Center web portal. The flaw enables privilege escalation—allowing unauthorized users to manipulate access levels. Exploitation has been observed in the wild, making immediate action necessary.

Technical Details

The vulnerability stems from improper access controls in the Microsoft Power Apps backend, enabling unauthorized users to elevate privileges remotely. Microsoft patched the issue via an automatic cloud update, securing all users by late November 2024. However, attackers had a window to exploit the flaw before the fix. CISA later added CVE-2024-49035 to its Known Exploited Vulnerabilities catalog.

Risks & Exploitation

Attackers could:

  • Gain administrative access to Partner Center
  • View and modify sensitive data
  • Pivot into client environments, enabling supply-chain attacks

Given Partner Center’s role in managing customer cloud services, this could impact thousands of organizations. Threat actors, including cybercriminals and state-backed groups, are actively targeting IT service providers for broader access.

Mitigation Steps

  1. Verify Patch Deployment – Microsoft’s fix is automatic, but check your Partner Center service health dashboard to confirm.
  2. Review Audit Logs – Look for unusual logins, privilege changes, or unauthorized access.
  3. Reset Credentials & Enforce MFA – Strengthen authentication to prevent unauthorized access.
  4. Limit Privileges – Apply the principle of least privilege to reduce exposure.

Under Cyber Attack?

Fill out the form and we will contact you immediately.