CVE-2022-24469: Azure Site Recovery Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 8.1)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Mar
Released
2022-03-08
EPSS Score
7.21% (percentile: 91.6%)

FAQ

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? No special privileges are required to exploit this vulnerability. An attacker needs to have network connectivity to the replication appliance. What is Azure Site Recovery? Azure Site Recovery helps ensure business continuity by keeping business apps and workloads running during outages. It is a service but also has a few on-premise components. Please visit this link for more details: About Azure Site Recovery - Azure Site Recovery To what scenario does this vulnerability apply? This vulnerability applies to a VMWare-to-Azure scenario. Please visit this link for more details: VMware VM disaster recovery architecture in Azure Site Recovery - Classic - Azure Site Recovery. What can I do to protect myself from this vulnerability? You can follow the steps here (Update rollup 60 for Azure Site Recovery -K5011122) to update to version 9.47. What could an attacker do with the exposed credentials? An attacker could call Azure Site Recovery APIs provided by the Configuration Server and in turn get access to configuration data including credentials for the protected systems. Using the APIs, the attacker could also modify or delete configuration data which in turn will impact Site Recovery operation.

Affected Products (1)

Azure

  • Azure Site Recovery VMWare to Azure

Security Updates (1)

Acknowledgments

William Söderberg with <a href="https://www.f-secure.com/">F-Secure</a>

Revision History

  • 2022-03-08: Information published.