CVE-2024-21397: Microsoft Azure File Sync Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 5.3)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Feb
Released
2024-02-13
EPSS Score
0.27% (percentile: 50.2%)

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker can create new files in directories they do not normally have access to. Those can only be on directories where Azure File Sync is configured, which could include SYSTEM directories. However, the attacker would not gain privileges to read, modify, or delete files. According to the CVSS metrics, successful exploitation of this vulnerability would not impact confidentiality (C:N), but would have a major impact on integrity (I:H) and have less impact on availability (A:L). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could affect the integrity because they could create new files in system directories. Confidentiality is not affected by a successful attack, because the attacker cannot modify, delete, or read files. A successful exploitation could have come impact on availability because there could be some interruption to the availability of the file server.

Affected Products (4)

Azure

  • Azure File Sync v16.0
  • Azure File Sync v15.0
  • Azure File Sync v14.0
  • Azure File Sync v17.0

Security Updates (2)

Acknowledgments

3wyeye5 with OSR

Revision History

  • 2024-02-13: Information published.