Описание
Azure Site Recovery Elevation of Privilege Vulnerability
FAQ
According to the CVSS metric, privileges required is low (PR:L). What privileges are required?
To successfully exploit this vulnerability, an attacker needs to be authorized as a local user on the vulnerable component.
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
No special privileges are required to exploit this vulnerability. An attacker needs to have network connectivity to the replication appliance.
According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) and major loss of integrity (I:H) but have no effect on availability (A:N). What does that mean for this vulnerability?
Exploiting this vulnerability could allow an attacker to disclose encrypted credential and modify data using the credentials, but cannot impact the availability of the service.
What is Azure Site Recovery?
Azure Site Recovery helps ensure business continuity by keeping business apps and workloads running during outages. It is a service but also has a few on-premise components. Please visit this link for more details: About Azure Site Recovery - Azure Site Recovery
To what scenario does this vulnerability apply?
This vulnerability applies to a VMWare-to-Azure scenario. Please visit this link for more details: VMware VM disaster recovery architecture in Azure Site Recovery - Classic - Azure Site Recovery.
What can I do to protect myself from this vulnerability? You can follow the steps here to update to version 9.50
Is there information about new available options?
Yes, please see General availability: Upgrade VMware VMs protected by Site Recovery to modernized experience for more information.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
8.1 High
CVSS3
Связанные уязвимости
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.
Уязвимость средства аварийного восстановления для виртуальных машин Azure Site Recovery VMWare to Azure, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
EPSS
8.1 High
CVSS3