Описание
Azure Service Fabric Container Elevation of Privilege Vulnerability
FAQ
Which Azure service(s) does this affect?
This vulnerability affects Azure Service Fabric clusters and standalone Service Fabric clusters orchestrated by Docker. Only users who implement the Docker app containers can be affected.
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could elevate their privileges and gain control over the Service Fabric cluster. This vulnerability does not allow the attacker to elevate privileges outside of the compromised cluster.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to first compromise the Service Fabric container and for the targeted environment to be architected in a unique manner.
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.
How do I protect myself from this vulnerability?
To be protected from this vulnerability customers must perform the following actions:
Manually upgrade your Service Fabric Cluster runtime to the latest version(s) provided in 8.2 CU8, 9.0 CU5, or 9.1 CU1 as appropriate. Guidance on how to perform an update can be found here: Upgrade the Service Fabric version that runs on your cluster.
Manually enable and configure the BlockAccessToWireServer feature flag on your Service Fabric Clusters.
NOTE: This feature restricts connectivity to the internal Azure platform resource (168.63.129.16). Customers are highly encouraged to review their cluster endpoints and ensure they are not making any calls or requests to 168.63.129.16 prior to enabling this feature to prevent service interruptions.
What Service Fabric versions are protected against this vulnerability?
The Service Fabric versions listed below provide customers the ability to enable the BlockAccessToWireServer feature flag which will protect against this vulnerability. Customers without auto-update enabled must update their Service Fabric resources as appropriate.
| Product | Platform | Version |
|---|---|---|
| Azure Service Fabric 8.2 CU8 | Windows | 8.2.1723.9590 |
| Azure Service Fabric 8.2 CU8 | Ubuntu 18 | 8.2.1521.1 |
| Azure Service Fabric 9.0 CU5 | Ubuntu 18 | 9.0.1148.1 |
| Azure Service Fabric 9.0 CU5 | Ubuntu 20 | 9.0.1148.1 |
| Azure Service Fabric 9.0 CU5 | Windows | 9.0.1155.9590 |
| Azure Service Fabric 9.1 CU1 | Ubuntu 18 | 9.1.1230.1 |
| Azure Service Fabric 9.1 CU1 | Ubuntu 20 | 9.1.1230.1 |
| Azure Service Fabric 9.1 CU1 | Windows | 9.1.1436.9590 |
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Azure Service Fabric 8.2 | ||
| Azure Service Fabric 9.0 for Linux | ||
| Azure Service Fabric 9.1 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
7 High
CVSS3
Связанные уязвимости
Azure Service Fabric Container Elevation of Privilege Vulnerability
Azure Service Fabric Container Elevation of Privilege Vulnerability.
Уязвимость демона WAagent службы Azure Service Fabric Container, позволяющая нарушителю повысить свои привилегии
EPSS
7 High
CVSS3