CVE-2025-47989: Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Unlikely
Patch Tuesday
2025-Oct
Released
2025-10-14
Last Updated
2025-10-15
EPSS Score
0.04% (percentile: 11.4%)

Description

Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could elevate their privileges as ‘NT AUTHORITY\SYSTEM’ user and perform arbitrary code execution. What actions do customers need to take to protect themselves from this vulnerability? Customers should update their Azure Connected Machine Agent to the latest version. For more information, see What's new with Azure Connected Machine agent. According to the CVSS metric, the attack vector is local (AV:L) and privileges required is low (PR:L). What does this mean in the context of this elevation of privilege vulnerability? An attacker needs to be authorized as a standard user on the localhost to execute this attack. They could then elevate their privileges to perform unauthorized operations. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.

Affected Products (1)

Azure

  • Arc Enabled Servers - Azure Connected Machine Agent

Security Updates (2)

Acknowledgments

Sharan Patil with <a href="https://consulting.withsecure.com/">WithSecure Consulting</a>

Revision History

  • 2025-10-14: Information published.
  • 2025-10-15: Affected software updated with new package information.