CVE-2024-21424: Azure Compute Gallery Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 6.5)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Apr
Released
2024-04-09
EPSS Score
0.94% (percentile: 76.2%)

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited administrator privileges. According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An authenticated attacker with Read permissions to an Azure Compute Gallery Virtual Machine (VM) deployment could replicate the disk into another VM and view the data it contains. However, they cannot remove or delete the disk from the targeted VM, nor can they alter the disk's data. What actions do customers need to take to protect themselves from this vulnerability? The vulnerability has been mitigated by the latest change to the Azure Compute Gallery (ACG) image creation permission requirements. Traditionally, read access on the Virtual Machine and disks/snapshots were required to import the VM/disk into an ACG image. To enhance the security posture and ensure that permissions are granted accurately at the appropriate access level during Virtual Machine Image creation in ACG, customers will be required to have write access on the source Virtual Machine and disks/snapshots/blobs. For information on how to update permissions, see What RBAC Permissions are required to create an ACG Image.

Affected Products (1)

Azure

  • Azure Compute Gallery

Security Updates (1)

Acknowledgments

Anonymous

Revision History

  • 2024-04-09: Information published.