Improper input validation in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could elevate their privileges to 'root' user. How could an attacker exploit this vulnerability? An attacker with the ability to run code as the syslog user on an affected Azure Linux Virtual Machine could modify specific configuration files used by the Azure Monitor agent. The agent processes these files with root‑level permissions and does not properly validate their contents, a malicious modification could cause the agent to execute unintended commands with elevated privileges. If exploited, the attacker could gain root access on the affected VM.
P1hcn