CVE-2023-36414: Azure Identity SDK Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:W/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Oct
Released
2023-10-10
Last Updated
2023-10-13
EPSS Score
3.28% (percentile: 87.2%)

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality. According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call. The privilege requirement is low because the attacker needs to be authenticated as a normal user. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by passing a specially crafted OS-level command to a specific SDK property which is passed to the underlying CLI and results in remote code execution. Which credential types provided by the Azure Identity client library are affected? The vulnerability exists in the following credential types: DefaultAzureCredential AzureCliCredential AzureDeveloperCliCredential AzurePowerShellCredential

Affected Products (1)

Azure

  • Azure Identity SDK for .NET

Security Updates (1)

Acknowledgments

<a href="https://www.xing.com/profile/martin_wrona3">Martin Wrona (martin_jw)</a> with <a href="https://www.galaxus.ch/">Digitec Galaxus AG</a>

Revision History

  • 2023-10-10: Information published.
  • 2023-10-13: Added an FAQ. This is an information change only.