CVE-2025-59285: Azure Monitor Agent Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Unlikely
Patch Tuesday
2025-Oct
Released
2025-10-14
EPSS Score
0.48% (percentile: 65.3%)

Description

Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

FAQ

According to the CVSS metric, the attack vector is local (AV:L) and the privilege required is none (PR:L). What privileges could an attacker gain with successful exploitation? A local user could take advantage of this vulnerability and perform elevation of privilege (EOP). By successfully exploiting this vulnerability, the attacker could elevate their privileges to obtain root level access on the virtual machine. According to the CVSS metric, the attack complexity is high (AC:H). What is does this mean in the context of the elevation of privilege vulnerability? In order to successfully exploit this vulnerability, the attacker requires write access to the configuration directory by creating malicious files in a directory before the Azure Monitor Agent is installed or before the service starts after system restart.

Affected Products (1)

Azure

  • Azure Monitor Agent

Security Updates (1)

Acknowledgments

P1hcn

Revision History

  • 2025-10-14: Information published.