CVE-2024-29989: Azure Monitor Agent Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 8.4)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Apr
Released
2024-04-09
EPSS Score
0.51% (percentile: 66.4%)

FAQ

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities. What actions do customers need to take to protect themselves from this vulnerability? Customers who have disabled Automatic Extension Upgrades or would like to upgrade an extension immediately must manually update their Azure Monitor Agent to the latest version. For more information on how to perform a manual update, see Manage Azure Monitor Agent. How could an attacker exploit this vulnerability and what privileges could an attacker gain? An authenticated attacker with read access permissions can exploit this vulnerability to perform arbitrary file and folder deletion on the host where the Azure Monitor Agent is installed. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.

Affected Products (1)

Azure

  • Azure Monitor Agent

Security Updates (1)

Acknowledgments

<a href="https://twitter.com/afang5472">Fangming Gu</a>, <a href="https://twitter.com/filip_dragovic">Filip Dragović</a>, R4nger &amp; Zhiniang Peng

Revision History

  • 2024-04-09: Information published.