SB2022080929 - Multiple vulnerabilities in Microsoft Azure Site Recovery



SB2022080929 - Multiple vulnerabilities in Microsoft Azure Site Recovery

Published: August 9, 2022

Security Bulletin ID SB2022080929
Severity
Medium
Patch available
YES
Number of vulnerabilities 34
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 3% Low 97%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 34 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2022-35776)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the Azure Site Recovery. A remote administrator on the local network can pass specially crafted input to the application and perform a denial of service (DoS) attack.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35809)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35782)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35808)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35807)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35801)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35775)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35800)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35774)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35799)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


11) Input validation error (CVE-ID: CVE-2022-35772)

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in the Azure Site Recovery. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.


12) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35783)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


13) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35815)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


14) Input validation error (CVE-ID: CVE-2022-35824)

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in the Azure Site Recovery. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.


15) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35819)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35818)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


17) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35791)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


18) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35817)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


19) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35816)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


20) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35790)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


21) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35789)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


22) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35814)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


23) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35788)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


24) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35813)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


25) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35787)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


26) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35786)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


27) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35812)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


28) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35785)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


29) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35811)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


30) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35810)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


31) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35784)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


32) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35781)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


33) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35780)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


34) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35802)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.


Remediation

Install update from vendor's website.

References