Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.
How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by intercepting the unsecured communication between the configurator app and target machines, modifying the responses, and using that to trigger command injection that runs arbitrary code with admin privileges on the system. They could then extract the Azure token from the app’s logs and use it to move laterally into the cloud environment. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? A high attack complexity means the attacker must be able to perform a precise machine‑in‑the‑middle modification of Kerberos traffic, which requires specific network positioning and conditions to succeed.
Michal Kamensky with Microsoft