CVE-2024-20667: Azure DevOps Server Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 7.5)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Feb
Released
2024-02-13
EPSS Score
0.31% (percentile: 54.6%)

FAQ

According to the CVSS metric, the attack vector is network (AV:N), attack complexity is high (AC:H), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? Successful exploitation of this vulnerability requires the attacker to have Queue Build permissions and for the target Azure DevOps pipeline to meet certain conditions for an attacker to exploit this vulnerability.

Affected Products (3)

Azure

  • Azure DevOps Server 2022.1

Developer Tools

  • Azure DevOps Server 2019.1.2
  • Azure DevOps Server 2020.1.2

Security Updates (3)

Revision History

  • 2024-02-13: Information published.