Описание
Azure Compute Gallery Elevation of Privilege Vulnerability
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain specific limited administrator privileges.
According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?
An authenticated attacker with Read permissions to an Azure Compute Gallery Virtual Machine (VM) deployment could replicate the disk into another VM and view the data it contains. However, they cannot remove or delete the disk from the targeted VM, nor can they alter the disk's data.
What actions do customers need to take to protect themselves from this vulnerability?
The vulnerability has been mitigated by the latest change to the Azure Compute Gallery (ACG) image creation permission requirements. Traditionally, read access on the Virtual Machine and disks/snapshots were required to import the VM/disk into an ACG image. To enhance the security posture and ensure that permissions are granted accurately at the appropriate access level during Virtual Machine Image creation in ACG, customers will be required to have write access on the source Virtual Machine and disks/snapshots/blobs.
For information on how to update permissions, see What RBAC Permissions are required to create an ACG Image.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
Azure Compute Gallery Elevation of Privilege Vulnerability
Azure Compute Gallery Elevation of Privilege Vulnerability
Уязвимость программного средства для создания и управления образов виртуальных машин (VM) и контейнеров Azure Compute Gallery, связанная с недостатками контроля доступа, позволяющая нарушителю повысить свои привилегии
EPSS
6.5 Medium
CVSS3