#VU88367 Improper access control in Microsoft products - CVE-2024-28917


Vulnerability identifier: #VU88367

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-28917

CWE-ID: CWE-284

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Azure Arc Cluster microsoft.videoindexer Extension
Other software / Other software solutions
Azure Arc Cluster microsoft.openservicemesh Extension
Other software / Other software solutions
Azure Arc Cluster microsoft.networkfabricserviceextension Extension
Other software / Other software solutions
Azure Arc Cluster microsoft.iotoperations.mq Extension
Other software / Other software solutions
Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension
Other software / Other software solutions
Azure Arc Cluster microsoft.azure.hybridnetwork Extension
Other software / Other software solutions
Azure Arc Cluster microsoft.azstackhci.operator Extension
Other software / Other software solutions

Vendor: Microsoft

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in Azure Arc-enabled Kubernetes Extension Cluster-Scope. A remote administrator on the local network can bypass implemented security restrictions and gain access to sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Azure Arc Cluster microsoft.videoindexer Extension: All versions

Azure Arc Cluster microsoft.openservicemesh Extension: All versions

Azure Arc Cluster microsoft.networkfabricserviceextension Extension: All versions

Azure Arc Cluster microsoft.iotoperations.mq Extension: All versions

Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension: All versions

Azure Arc Cluster microsoft.azure.hybridnetwork Extension: All versions

Azure Arc Cluster microsoft.azstackhci.operator Extension: All versions


External links
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28917


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability