{
  "document": {
    "acknowledgments": [
      {
        "names": [
          "Kentaro Kawane with <a href=\"https://gmo-cybersecurity.com/\">GMO Cybersecurity by Ierae, Inc.</a>"
        ]
      },
      {
        "names": [
          "<a href=\"https://twitter.com/hoangnx99\">hoangha</a> with <a href=\"https://lab.viettelcybersecurity.com/\">VCSLab of Viettel Cyber Security</a>"
        ]
      },
      {
        "names": [
          "Butterfly"
        ]
      }
    ],
    "aggregate_severity": {
      "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      },
      {
        "category": "general",
        "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
        "title": "Customer Action"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability - HTML",
        "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898"
      },
      {
        "category": "self",
        "summary": "CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability - CSAF",
        "url": "https://msrc.microsoft.com/csaf/advisories/2026/msrc_cve-2026-42898.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Exploitability Index",
        "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability",
    "tracking": {
      "current_release_date": "2026-05-13T07:00:00.000Z",
      "generator": {
        "date": "2026-05-14T18:07:41.874Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2026-42898",
      "initial_release_date": "2026-05-12T07:00:00.000Z",
      "revision_history": [
        {
          "date": "2026-05-12T07:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2026-05-13T07:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Updated the fixed version number. This is an informational change only."
        },
        {
          "date": "2026-05-13T07:00:00.000Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Acknowledgement Updated"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "<9.1.45.11",
            "product": {
              "name": "Microsoft Dynamics 365 (on-premises) version 9.1 <9.1.45.11",
              "product_id": "1"
            }
          },
          {
            "category": "product_version",
            "name": "9.1.45.11",
            "product": {
              "name": "Microsoft Dynamics 365 (on-premises) version 9.1 9.1.45.11",
              "product_id": "11921"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft Dynamics 365 (on-premises) version 9.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-42898",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code ('Code Injection')"
      },
      "notes": [
        {
          "category": "general",
          "text": "Microsoft",
          "title": "Assigning CNA"
        },
        {
          "category": "faq",
          "text": "Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.",
          "title": "According to the CVSS metric, privileges required is low (PR:L).  What does that mean for this vulnerability?"
        },
        {
          "category": "faq",
          "text": "An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.",
          "title": "According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?"
        },
        {
          "category": "faq",
          "text": "An attacker with the required permissions could modify the saved state of a process session in Dynamics CRM and trigger the system to process that data, which could result in the server unintentionally executing malicious code.",
          "title": "How could an attacker exploit this vulnerability?"
        }
      ],
      "product_status": {
        "fixed": [
          "11921"
        ],
        "known_affected": [
          "1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability - HTML",
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898"
        },
        {
          "category": "self",
          "summary": "CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability - CSAF",
          "url": "https://msrc.microsoft.com/csaf/advisories/2026/msrc_cve-2026-42898.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "9.1.45.11:Security Update:https://support.microsoft.com/help/5078943",
          "product_ids": [
            "1"
          ],
          "url": "https://support.microsoft.com/help/5078943"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "exploitCodeMaturity": "UNPROVEN",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "remediationLevel": "OFFICIAL_FIX",
            "reportConfidence": "CONFIRMED",
            "scope": "CHANGED",
            "temporalScore": 8.6,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Remote Code Execution"
        },
        {
          "category": "exploit_status",
          "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely"
        }
      ],
      "title": "Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability"
    }
  ]
}