CVE-2023-35394: Azure HDInsight Jupyter Notebook Spoofing Vulnerability

Overview

Severity
Medium (CVSS 4.6)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Aug
Released
2023-08-08
EPSS Score
0.20% (percentile: 42.4%)

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious file that the victim would have to execute. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L), and availability (A:N). What does that mean for this vulnerability? Successful exploitation of this vulnerability has limited impacts to Confidentiality and Integrity and no impact on Availability. An attacker would need to combine this vulnerability with other vulnerabilities to perform an attack.

Affected Products (1)

Azure

  • Azure HDInsight

Security Updates (1)

Acknowledgments

Lidor B. with Orca Security

Revision History

  • 2023-08-08: Information published.