Описание
Azure Service Connector Security Feature Bypass Vulnerability
FAQ
How can I update my Azure Service Connector to the latest version?
Azure Service Connector updates when Azure Command-Line Interface (CLI) is updated to the latest version. If you have automatic updates enabled (not enabled by default), no action is needed. For customers who manually update, please refer to How to update the Azure CLI for instructions on how to update Azure CLI.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to chain other vulnerabilities in order to successfully gain unauthorized access to the target environment.
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
An attacker must have RBAC Reader role access or above on the targeted Azure subscription to exploit this vulnerability. NOTE: The targeted product's authentication mechanisms (AuthZ and AuthN) are not affected and must be overcome to exploit this vulnerability.
What kind of security feature could be bypassed by successfully exploiting this vulnerability?
Azure Service Connector configures internal firewalls upon creation to safeguard connections and prevent unauthorized requests. An attacker who successfully exploits this vulnerability could bypass the firewall's restrictions enabling requests which are expected to be blocked, to succeed.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
7.5 High
CVSS3
Связанные уязвимости
Azure Service Connector Security Feature Bypass Vulnerability
Azure Service Connector Security Feature Bypass Vulnerability
Уязвимость соединителя служб Azure Service Connector, позволяющая нарушителю обойти существующие ограничения безопасности и повысить свои привилегии
EPSS
7.5 High
CVSS3