Lucene search

K
kasperskyKaspersky LabKLA65131
HistoryMar 12, 2024 - 12:00 a.m.

KLA65131 Multiple vulnerabilities in Microsoft Azure

2024-03-1200:00:00
Kaspersky Lab
threats.kaspersky.com
22
microsoft azure
vulnerabilities
privileges
arbitrary code
exploits
sdk
open management infrastructure
sonic
sentinel
automation
kubernetes
update management
container monitoring
security center
data studio
log analytics agent
ace
cve-ids
microsoft official advisories

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Multiple vulnerabilities were found in Microsoft Azure. Malicious users can exploit these vulnerabilities to gain privileges, spoof user interface, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Azure Data Studio can be exploited remotely to gain privileges.
  2. A spoofing vulnerability in Azure SDK can be exploited remotely to spoof user interface.
  3. An elevation of privilege vulnerability in Microsoft Azure Kubernetes Service Confidential Container can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in Open Management Infrastructure (OMI) can be exploited remotely to execute arbitrary code.
  5. An elevation of privilege vulnerability in Open Management Infrastructure (OMI) can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Software for Open Networking in the Cloud (SONiC) can be exploited remotely to gain privileges.

Original advisories

CVE-2024-26203

CVE-2024-21421

CVE-2024-21400

CVE-2024-21334

CVE-2024-21330

CVE-2024-21418

Exploitation

Public exploits exist for this vulnerability.

Related products

Microsoft-Azure

CVE list

CVE-2024-21334 critical

CVE-2024-21330 critical

CVE-2024-26203 high

CVE-2024-21421 critical

CVE-2024-21400 critical

CVE-2024-21418 critical

KB list

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Azure SDKOpen Management InfrastructureSoftware for Open Networking in the Cloud (SONiC) 201911Azure SentinelSoftware for Open Networking in the Cloud (SONiC) 202012Azure Automation Update ManagementContainer Monitoring SolutionAzure Kubernetes Service Confidential ContainersOperations Management Suite Agent for Linux (OMS)Azure AutomationAzure Security CenterSoftware for Open Networking in the Cloud (SONiC) 201811Azure Data StudioSoftware for Open Networking in the Cloud (SONiC) 202205Log Analytics Agent

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%