CVE-2024-35253: Microsoft Azure File Sync Elevation of Privilege Vulnerability

Overview

Severity
Medium (CVSS 4.4)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N/E:H/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Jun
Released
2024-06-11
EPSS Score
0.84% (percentile: 74.8%)

FAQ

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. What privileges could be gained by an attacker who successfully exploited the vulnerability? Exploiting this vulnerability would allow the attacker to perform arbitrary deletion of files that are not accessible to unprivileged users on the victim machine. According to the CVSS metric, user interaction is Required (UI:R). What does that mean for this vulnerability? The successful exploitation of this vulnerability requires a user with administrator privileges to perform specific operations on the endpoint targeted by the attacker.

Affected Products (3)

Azure

  • Azure File Sync v16.0
  • Azure File Sync v18.0
  • Azure File Sync v17.0

Security Updates (2)

Acknowledgments

3wyeye5 with OSR, Fangming Gu with OSR, chino71 with OSR

Revision History

  • 2024-06-11: Information published.