Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-21224

Опубликовано: 13 янв. 2026
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Azure Connected Machine Agent Elevation of Privilege Vulnerability

Stack-based buffer overflow in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

According to the CVSS metric, the attack vector is local (AV:L). What does that mean for this vulnerability?

An attacker could trigger this vulnerability remotely by having valid permissions on the Azure Resource Manager (ARM) API to access the Azure Relay. In the worst case scenario, an attacker could locally trigger this vulnerability by running code as a lower-privileged user on the same computer that Azure Arc is running on (AV:L). When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk.

Обновления

ПродуктСтатьяОбновление
Azure Connected Machine Agent

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 15%
0.00049
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
21 день назад

Stack-based buffer overflow in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

CVSS3: 7.8
github
21 день назад

Stack-based buffer overflow in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

CVSS3: 7.8
fstec
22 дня назад

Уязвимость программного средства управления серверами и виртуальными машинами Azure Connected Machine Agent, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 15%
0.00049
Низкий

7.8 High

CVSS3