CVE-2024-20667: Azure DevOps Server Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 7.5)
- CVSS Vector
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2024-Feb
- Released
- 2024-02-13
- EPSS Score
- 0.31% (percentile: 54.6%)
FAQ
According to the CVSS metric, the attack vector is network (AV:N), attack complexity is high (AC:H), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?
Successful exploitation of this vulnerability requires the attacker to have Queue Build permissions and for the target Azure DevOps pipeline to meet certain conditions for an attacker to exploit this vulnerability.
Affected Products (3)
Azure
- Azure DevOps Server 2022.1
Developer Tools
- Azure DevOps Server 2019.1.2
- Azure DevOps Server 2020.1.2
Security Updates (3)
Revision History
- 2024-02-13: Information published.