Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-21531

Опубликовано: 21 июл. 2023
Источник: msrc
CVSS3: 7
EPSS Низкий

Описание

Azure Service Fabric Container Elevation of Privilege Vulnerability

FAQ

Which Azure service(s) does this affect?

This vulnerability affects Azure Service Fabric clusters and standalone Service Fabric clusters orchestrated by Docker. Only users who implement the Docker app containers can be affected.

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could elevate their privileges and gain control over the Service Fabric cluster. This vulnerability does not allow the attacker to elevate privileges outside of the compromised cluster.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to first compromise the Service Fabric container and for the targeted environment to be architected in a unique manner.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

How do I protect myself from this vulnerability?

To be protected from this vulnerability customers must perform the following actions:

  1. Manually upgrade your Service Fabric Cluster runtime to the latest version(s) provided in 8.2 CU8, 9.0 CU5, or 9.1 CU1 as appropriate. Guidance on how to perform an update can be found here: Upgrade the Service Fabric version that runs on your cluster.

  2. Manually enable and configure the BlockAccessToWireServer feature flag on your Service Fabric Clusters.

NOTE: This feature restricts connectivity to the internal Azure platform resource (168.63.129.16). Customers are highly encouraged to review their cluster endpoints and ensure they are not making any calls or requests to 168.63.129.16 prior to enabling this feature to prevent service interruptions.

What Service Fabric versions are protected against this vulnerability?

The Service Fabric versions listed below provide customers the ability to enable the BlockAccessToWireServer feature flag which will protect against this vulnerability. Customers without auto-update enabled must update their Service Fabric resources as appropriate.

ProductPlatformVersion
Azure Service Fabric 8.2 CU8Windows8.2.1723.9590
Azure Service Fabric 8.2 CU8Ubuntu 188.2.1521.1
Azure Service Fabric 9.0 CU5Ubuntu 189.0.1148.1
Azure Service Fabric 9.0 CU5Ubuntu 209.0.1148.1
Azure Service Fabric 9.0 CU5Windows9.0.1155.9590
Azure Service Fabric 9.1 CU1Ubuntu 189.1.1230.1
Azure Service Fabric 9.1 CU1Ubuntu 209.1.1230.1
Azure Service Fabric 9.1 CU1Windows9.1.1436.9590

Обновления

ПродуктСтатьяОбновление
Azure Service Fabric 8.2
Azure Service Fabric 9.0 for Linux
Azure Service Fabric 9.1

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 45%
0.00227
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
nvd
около 3 лет назад

Azure Service Fabric Container Elevation of Privilege Vulnerability

CVSS3: 7
github
около 3 лет назад

Azure Service Fabric Container Elevation of Privilege Vulnerability.

CVSS3: 7
fstec
больше 3 лет назад

Уязвимость демона WAagent службы Azure Service Fabric Container, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 45%
0.00227
Низкий

7 High

CVSS3