External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could elevate their privileges to 'root' user. How could an attacker exploit this vulnerability? An attacker could send specially crafted configuration messages to a locally running Azure Monitor Agent service that does not strictly validate incoming requests. By doing so, the attacker may be able to write files on the affected system, which could then be used to run unauthorized code.
P1hcn