CVE-2024-38216: Azure Stack Hub Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 8.2)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2024-Sep
Released
2024-09-10
Last Updated
2024-09-19
EPSS Score
1.23% (percentile: 79.1%)

FAQ

According to the CVSS metric, user interaction is required (UI:R) and privileges required are low (PR:L). What does that mean for this vulnerability? An authenticated attacker must wait for a victim user to initiate a connection. What privileges could an attacker gain with a successful exploitation? An attacker who successfully exploited this vulnerability could gain unauthorized access to system resources, potentially allowing them to perform actions with the same privileges as the compromised process. This could lead to further system compromise and unauthorized actions within the network. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content.

Affected Products (1)

Azure

  • Azure Stack Hub

Security Updates (1)

Acknowledgments

Felix Boulet with <a href="https://www.cyber.gouv.qc.ca/">Centre gouvernemental de cyberd&#233;fense (CGCD)</a>, Mathieu Fiore Laroche with <a href="https://www.cyber.gouv.qc.ca/">Centre gouvernemental de cyberd&#233;fense (CGCD)</a>

Revision History

  • 2024-09-10: Information published.
  • 2024-09-19: Updated the build numbers. This is an informational update only.