Improper Access Control (CWE-284)
Azure CycleCloud Remote Code Execution Vulnerability. This vulnerability affects Microsoft Azure CycleCloud versions from 8.0.0 up to, but not including, 8.6.3. It is classified as an Improper Access Control (CWE-284) vulnerability. The vulnerability has a CVSS v3.1 base score of 7.8, indicating a high severity. The attack vector is local, requires low attack complexity and low privileges, and does not need user interaction.
If exploited, this vulnerability could allow an attacker to execute arbitrary code on the affected system. The potential impacts are severe, with high confidentiality, integrity, and availability impacts. This means an attacker could potentially gain unauthorized access to sensitive information, modify or delete critical data, and disrupt the normal operation of the Azure CycleCloud service.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Microsoft has released an update to address the issue in Azure CycleCloud version 8.6.3 and later.
To mitigate this vulnerability, it is strongly recommended to update Azure CycleCloud to version 8.6.3 or later as soon as possible. Given the high severity score and the potential for remote code execution, this update should be prioritized in patching efforts. In addition to patching, it's advisable to implement the principle of least privilege, limiting user access rights to the minimum necessary for their work. Regular security assessments and monitoring for unusual activities in Azure CycleCloud environments are also recommended as additional protective measures.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
A CVSS base score of 7.8 has been assigned.
Feedly found the first article mentioning CVE-2024-38195. See article
NVD published the first details for CVE-2024-38195
Feedly estimated the CVSS score as HIGH
EPSS Score was set to: 0.05% (Percentile: 19%)