Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-49060

Опубликовано: 15 нояб. 2024
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Azure Stack HCI Elevation of Privilege Vulnerability

FAQ

What actions should I take to be protected from this vulnerability?

Customers must perform the following to mitigate this vulnerability:

  1. Update Azure Stack HCI resources to version 2411. Instructions on how to update can be found here.
  2. Rotate the administrator and user account passwords for all Azure Arc VMs deployed prior to updating the Azure Stack HCI instance to version 2411. Instructions on how to update these passwords can be found here.

The CVSS score for this vulnerability rates Scope as Changed (S:C). What does this mean?

The vulnerability is found within a component of the Azure Stack HCI cluster, but exploitation impacts Azure Arc VMs.

The CVSS score for this vulnerability rates Attack Vector as Local (AV:L). What does this mean?

Successful exploitation of this vulnerability requires an authenticated attacker to access the target Azure Stack HCI cluster, which could be performed through a remote desktop session or SSH.

Обновления

ПродуктСтатьяОбновление
Azure Stack HCI OS 23H2

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

EPSS

Процентиль: 75%
0.00903
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 года назад

Azure Stack HCI Elevation of Privilege Vulnerability

CVSS3: 8.8
github
около 1 года назад

Azure Stack HCI Elevation of Privilege Vulnerability

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость гиперконвергентной инфраструктуры Microsoft Azure Stack (HCI), связанная с использованием жестко закодированных учетных данных, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 75%
0.00903
Низкий

8.8 High

CVSS3