According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Successful exploitation of this vulnerability could allow an attacker to perform operations in the victim's hybrid cloud environment with the same privileges as the compromised managed identity. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the compromised managed identity. How could an attacker exploit this vulnerability? An attacker with basic user privileges could compromise an unencrypted service principal for a managed identity and perform service management operations on other resources in the hybrid environment the managed identity is permitted to manage.
Barry Markey with Microsoft