SB2022080929 - Multiple vulnerabilities in Microsoft Azure Site Recovery
Published: August 9, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 34 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2022-35776)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Azure Site Recovery. A remote administrator on the local network can pass specially crafted input to the application and perform a denial of service (DoS) attack.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35809)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35782)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35808)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35807)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35801)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35775)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35800)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35774)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35799)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
11) Input validation error (CVE-ID: CVE-2022-35772)
The vulnerability allows a remote user to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the Azure Site Recovery. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.
12) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35783)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
13) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35815)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
14) Input validation error (CVE-ID: CVE-2022-35824)
The vulnerability allows a remote user to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the Azure Site Recovery. A remote administrator can pass specially crafted input to the application and execute arbitrary code on the target system.
15) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35819)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35818)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
17) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35791)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
18) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35817)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
19) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35816)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
20) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35790)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
21) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35789)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
22) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35814)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
23) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35788)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
24) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35813)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
25) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35787)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
26) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35786)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
27) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35812)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
28) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35785)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
29) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35811)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
30) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35810)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
31) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35784)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
32) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35781)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
33) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35780)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
34) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-35802)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Azure Site Recovery, which leads to security restrictions bypass and privilege escalation.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35776
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35809
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35782
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35808
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35807
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35801
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35775
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35800
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35774
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35799
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35772
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35783
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35815
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35824
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35819
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35818
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35791
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35817
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35816
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35790
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35789
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35814
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35788
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35813
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35787
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35786
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35812
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35785
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35811
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35810
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35784
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35781
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35780
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35802