CVE-2024-21397

Improper Link Resolution Before File Access ('Link Following') (CWE-59)

Published: Feb 13, 2024

010
CVSS 5.3EPSS 0.04%Medium
CVE info copied to clipboard

Summary

Microsoft Azure File Sync has an Elevation of Privilege Vulnerability. This vulnerability is related to improper link resolution before file access, also known as 'Link Following'. It affects Azure File Sync versions from 14.0.0.0 up to (but not including) 16.2.0.0, as well as version 17.0.0.0.

Impact

The vulnerability has a high impact on integrity and a low impact on availability, with no direct impact on confidentiality. An attacker with low privileges could potentially exploit this vulnerability to elevate their privileges within the system. This could lead to unauthorized modification of files or limited disruption of services. The attack vector is local, meaning the attacker would need local access to the system to exploit this vulnerability.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available for this vulnerability. Microsoft released the patch on February 13, 2024.

Mitigation

To mitigate this vulnerability, it is recommended to apply the latest security updates provided by Microsoft for Azure File Sync. Specifically, ensure that Azure File Sync is updated to version 16.2.0.0 or later, except for version 17.0.0.0 which is also vulnerable. Additionally, implement the principle of least privilege for user accounts and limit local access to systems running Azure File Sync. Monitor for any suspicious file system activities or unexpected privilege escalations.

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

Timeline

CVE Assignment

NVD published the first details for CVE-2024-21397

Feb 13, 2024 at 10:15 AM
First Article

Feedly found the first article mentioning CVE-2024-21397. See article

Feb 13, 2024 at 6:03 PM / MSRC Security Update Guide
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Feb 13, 2024 at 7:22 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 6.7%)

Feb 14, 2024 at 2:42 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/azure_file_sync
+null more

Patches

Microsoft
+null more

Links to Mitre Att&cks

T1547.009: Shortcut Modification
+null more

Attack Patterns

CAPEC-132: Symlink Attack
+null more

CVSS V3.1

Attack Vector:Local
Attack Complexity:High
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:High
Availability Impact:Low

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI