CVE-2024-38179: Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Oct
Released
2024-10-08
Last Updated
2025-06-15
EPSS Score
0.39% (percentile: 59.9%)

FAQ

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Successful exploitation of this vulnerability could allow an attacker to perform operations in the victim's hybrid cloud environment with the same privileges as the compromised managed identity. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the compromised managed identity. How could an attacker exploit this vulnerability? An attacker with basic user privileges could compromise an unencrypted service principal for a managed identity and perform service management operations on other resources in the hybrid environment the managed identity is permitted to manage.

Affected Products (2)

Azure

  • Azure Stack HCI OS 22H2
  • Azure Stack HCI OS 23H2

Security Updates (1)

Acknowledgments

Barry Markey with Microsoft

Revision History

  • 2024-10-08: Information published.
  • 2025-06-15: Updated the build numbers. This is an informational update only.