Описание
Azure Monitor Agent Elevation of Privilege Vulnerability
FAQ
According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N), but has major impact on integrity (I:H) and availability (A:H). What does that mean for this vulnerability?
Exploitation of this vulnerability does not disclose any confidential information but allows an attacker to modify or delete files containing data which could cause the service to become unavailable.
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the NT AUTHORITY\SYSTEM account.
What actions do customers need to take to protect themselves from this vulnerability?
Customers who have disabled Automatic Extension Upgrades or would like to upgrade an extension immediately must manually update their Azure Monitor Agent to the latest version. For more information on how to perform a manual update, see Manage Azure Monitor Agent.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
7.1 High
CVSS3
Связанные уязвимости
Azure Monitor Agent Elevation of Privilege Vulnerability
Azure Monitor Agent Elevation of Privilege Vulnerability
Уязвимость инструмента сбора данных с виртуальных машин (VM) и физических серверов Azure Monitor Agent, связанная с неверным определением ссылки перед доступом к файлу, позволяющая нарушителю повысить свои привилегии
EPSS
7.1 High
CVSS3