Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-21329

Опубликовано: 13 фев. 2024
Источник: msrc
CVSS3: 7.3
EPSS Низкий

Описание

Azure Connected Machine Agent Elevation of Privilege Vulnerability

FAQ

Why is the update for Azure Connected Machine Agents unavailable?

The update was removed from the Microsoft Update Catalog due to reports of installation failing. The update will be re-released when the issue is resolved, and this CVE will be updated at that time.

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

A non-admin local user who has sufficient permissions to create symbolic links on a Windows computer that has Azure Connected Machine Agent installed (or before the agent is installed) could create links from a directory used by the agent to other privileged files on the computer. If the administrator later installs virtual machine extensions on the machine, those files could be deleted.

What privileges could an attacker gain with successful exploitation?

An attacker who successfully exploited the vulnerability could add symlinks and cause an arbitrary file delete as SYSTEM.

Обновления

ПродуктСтатьяОбновление
Azure Connected Machine Agent

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 71%
0.00674
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
почти 2 года назад

Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVSS3: 7.3
github
почти 2 года назад

Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVSS3: 7.3
fstec
почти 2 года назад

Уязвимость программного средства управления серверами и виртуальными машинами Azure Connected Machine Agent, связанная с отслеживанием символьных ссылок, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 71%
0.00674
Низкий

7.3 High

CVSS3