CVE-2026-32204: Azure Monitor Agent Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2026-May
Released
2026-05-12

Description

External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could elevate their privileges to 'root' user. How could an attacker exploit this vulnerability? An attacker could send specially crafted configuration messages to a locally running Azure Monitor Agent service that does not strictly validate incoming requests. By doing so, the attacker may be able to write files on the affected system, which could then be used to run unauthorized code.

Affected Products (1)

Azure

  • Azure Monitor Agent

Acknowledgments

P1hcn

Revision History

  • 2026-05-12: Information published.