CVE-2023-21751: Azure DevOps Server Spoofing Vulnerability
Overview
- Severity
- Medium (CVSS 6.5)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
- Category
- Spoofing
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2023-Dec
- Released
- 2023-12-13
- EPSS Score
- 0.25% (percentile: 48.0%)
FAQ
According to the CVSS metric,privileges required is low(PR:L). What does that mean for this vulnerability?
This means that an attacker needs to have a user account in the organization with the ability to run builds.
According to the CVSS metric, successful exploitation of this vulnerability could impact the integrity(I:H). What does that mean for this vulnerability?
Successful exploitation compromises the integrity of the build verification process, allowing an attacker to spoof and bypass verification.
Affected Products (2)
Azure
- Azure DevOps Server 2022.1
Developer Tools
- Azure DevOps Server 2020.1.2
Security Updates (1)
Acknowledgments
<a href="https://twitter.com/agdosil">Anton Garcia Dosil</a>
Revision History
- 2023-12-13: Information published. This CVE was addressed by updates that were released in December 2023, but the CVE was inadvertently omitted from the December 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Azure DevOps Server install the December 2023 updates to be protected from this vulnerability.