Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-21638
HistoryJan 10, 2024 - 9:44 p.m.

CVE-2024-21638 Azure IPAM solution Elevation of Privilege Vulnerability

2024-01-1021:44:23
CWE-269
GitHub_M
www.cve.org
azure ipam
elevation of privilege
vulnerability
patched
version 3.0.0

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.5%

Azure IPAM (IP Address Management) is a lightweight solution developed on top of the Azure platform designed to help Azure customers manage their IP Address space easily and effectively. By design there is no write access to customers’ Azure environments as the Service Principal used is only assigned the Reader role at the root Management Group level. Until recently, the solution lacked the validation of the passed in authentication token which may result in attacker impersonating any privileged user to access data stored within the IPAM instance and subsequently from Azure, causing an elevation of privilege. This vulnerability has been patched in version 3.0.0.

CNA Affected

[
  {
    "vendor": "Azure",
    "product": "ipam",
    "versions": [
      {
        "version": "< 3.0.0",
        "status": "affected"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.5%

Related for CVELIST:CVE-2024-21638