CVE-2025-26627: Azure Arc Installer Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2025-Mar
Released
2025-03-11
EPSS Score
0.16% (percentile: 36.8%)

Description

Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How do I know if I'm affected by this vulnerability? Only machines onboarded via Group Policy that have the GPO applied to them are affected. The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589' What steps are needed to protect from this vulnerability? Unassign and delete the previous Group Policy Object from the Group Policy Management Console (GPMC). Download the new scripts from the Fixed agent proxy parameter release in the Github repository 1.0.10. Run the DeployGPO script as before using the same parameters. Assign the new Group Policy Object to your groups/domains/units. For further information, please go to the Arc blade of Azure Portal and follow the instructions for GPO onboarding. Only machines onboarded via Group Policy that have the GPO applied to them are affected The GPO name is '[MSFT] Azure Arc Servers Onboarding' followed by a datetimestamp e.g. '[MSFT] Azure Arc Servers Onboarding20250220113589' According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to carefully time their actions to exploit the timing differences in the execution of specific operations. They must accurately measure these timing variations to infer sensitive information or gain unauthorized access. This often involves sophisticated techniques to manipulate and observe the timing behavior of the target system.

Affected Products (1)

Azure

  • Azure ARC

Security Updates (1)

Acknowledgments

SP with <a href="https://consulting.withsecure.com/">WithSecure Consulting</a>

Revision History

  • 2025-03-11: Information published.