CVE-2022-35791: Azure Site Recovery Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 6.5)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Aug
Released
2022-08-09
EPSS Score
5.99% (percentile: 90.7%)

FAQ

According to the CVSS metric, privileges required is high (PR:H). What privileges does an attacker require to exploit this vulnerability? Successful exploitation of this vulnerability requires an attacker to compromise admin credentials to one of the VMs associated with the configuration server. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to modify data that could result in the service being unavailable. What is Azure Site Recovery? Azure Site Recovery helps ensure business continuity by keeping business apps and workloads running during outages. It is a service but also has a few on-premise components. Please visit this link for more details: About Azure Site Recovery - Azure Site Recovery To what scenario does this vulnerability apply? This vulnerability applies to a VMWare-to-Azure scenario. Please visit this link for more details: VMware VM disaster recovery architecture in Azure Site Recovery - Classic - Azure Site Recovery. What can I do to protect myself from this vulnerability? You can follow the steps here to update to version 9.50 Is there information about new available options? Yes, please see General availability: Upgrade VMware VMs protected by Site Recovery to modernized experience for more information.

Affected Products (1)

Azure

  • Azure Site Recovery VMWare to Azure

Security Updates (1)

Acknowledgments

Anonymous

Revision History

  • 2022-08-09: Information published.