CVE-2022-38007: Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Sep
Released
2022-09-13
EPSS Score
0.72% (percentile: 72.6%)

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited the vulnerability could replace Microsoft-shipped code with their own code, which would then be run as root in the context of a Guest Configuration daemon. On an Azure VM with the Guest Configuration Linux Extension installed, this would run in the context of the GC Policy Agent daemon. On an Azure Arc-enabled server, it could run in the context of the GC Arc Service or Extension Service daemons.

Affected Products (2)

Azure

  • Azure Guest Configuration
  • Azure ARC

Security Updates (2)

Acknowledgments

Vladimir Abramzon with Microsoft Offensive Research Security Engineering

Revision History

  • 2022-09-13: Information published.