CVE-2024-38175: Azure Managed Instance for Apache Cassandra Elevation of Privilege Vulnerability

Overview

Severity
Critical (CVSS 9.6)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N/E:F/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Aug
Released
2024-08-20
Last Updated
2024-10-10
EPSS Score
6.12% (percentile: 90.8%)

Description

An improper access control vulnerability in the Azure Managed Instance for Apache Cassandra allows an authenticated attacker to elevate privileges over a network.

FAQ

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) and major loss of integrity (I:H) but have no effect on availability (A:N). What does that mean for this vulnerability? Exploiting this vulnerability allows an attacker to view highly sensitive resource information (C:H) and results in a total loss of protection for that data (I:H), but does not provide the capability to impact resource availability. How could an attacker exploit this vulnerability? An attacker with permissions to deploy User Defined Functions (UDF) in an Azure Managed Instance for Apache Cassandra cluster can send specially crafted requests to the underlying host and extract credentials for managed identities of other clusters on the same host node. The compromised credentials enable the attacker to impersonate the victim's managed identity and retrieve information from other clusters hosted on the node which could be outside of the attacker's tenant.

Affected Products (1)

Azure

  • Azure Managed Instance for Apache Cassandra

Acknowledgments

<a href="https://twitter.com/wtm_offensi">wtm</a> with <a href="https://offensi.com/">Offensi</a>

Revision History

  • 2024-08-20: Information published.
  • 2024-10-10: Updated product information in the Software Update table. This is an informational change only.