CVE-2022-41085: Azure CycleCloud Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.5)
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Nov
Released
2022-11-08
EPSS Score
0.86% (percentile: 75.0%)

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to brute force authentication and obtain a successful login. What versions are impacted by this vulnerability? All versions are impacted and should be updated based on the documentation provided in the CVE. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.

Affected Products (2)

Azure

  • Azure CycleCloud 8.0.0
  • Azure CycleCloud 7

Security Updates (1)

Acknowledgments

Yiming Xiang with <a href="https://www.nsfocus.cn/">NSFOCUS TIANJI LAB</a>

Revision History

  • 2022-11-08: Information published.