Lucene search

K
kasperskyKaspersky LabKLA20046
HistoryNov 08, 2022 - 12:00 a.m.

KLA20046 Multiple vulnerabilities in Microsoft Azure

2022-11-0800:00:00
Kaspersky Lab
threats.kaspersky.com
12
microsoft azure
vulnerabilities
arbitrary code execution
elevation of privilege
remote exploitation
critical
guix studio
windows subsystem for linux
cyclecloud

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.2%

Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Azure RTOS GUIX Studio can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows Subsystem for Linux (WSL2) Kernel can be exploited remotely to gain privileges.
  3. An elevation of privilege vulnerability in Azure CycleCloud can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in Azure CLI can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2022-41051

CVE-2022-38014

CVE-2022-41085

CVE-2022-39327

Related products

Microsoft-Azure

CVE list

CVE-2022-38014 high

CVE-2022-41051 critical

CVE-2022-41085 critical

CVE-2022-39327 critical

KB list

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Azure CycleCloud 8Azure EFLOWAzure CLIAzure RTOS GUIX StudioAzure CycleCloud 7

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.2%