Lucene search

K
kasperskyKaspersky LabKLA20234
HistoryFeb 14, 2023 - 12:00 a.m.

KLA20234 Multiple vulnerabilities in Microsoft Azure

2023-02-1400:00:00
Kaspersky Lab
threats.kaspersky.com
12
microsoft azure
vulnerabilities
sensitive information
privileges
arbitrary code
user interface

8.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

8.5 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.1%

Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. An information disclosure vulnerability in Azure Machine Learning Compute Instance can be exploited remotely to obtain sensitive information.
  2. An elevation of privilege vulnerability in Azure App Service on Azure Stack Hub can be exploited remotely to gain privileges.
  3. A remote code execution vulnerability in Azure Data Box Gateway can be exploited remotely to execute arbitrary code.
  4. A spoofing vulnerability in Azure DevOps Server 2022 can be exploited remotely to spoof user interface.

Original advisories

CVE-2023-23382

CVE-2023-21777

CVE-2023-21703

CVE-2023-21564

Related products

Microsoft-Edge

Microsoft-Azure

CVE list

CVE-2023-23382 high

CVE-2023-21777 critical

CVE-2023-21703 high

CVE-2023-21564 high

KB list

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Azure App Service on Azure Stack HubAzure Data Box GatewayAzure Stack EdgeAzure DevOps Server 2022Azure Machine Learning

8.7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L

8.5 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.1%