Information disclosure in Microsoft Azure Arc-enabled Kubernetes Extensions



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-28917
CWE-ID CWE-284
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Azure Arc Cluster microsoft.videoindexer Extension
Other software / Other software solutions

Azure Arc Cluster microsoft.openservicemesh Extension
Other software / Other software solutions

Azure Arc Cluster microsoft.networkfabricserviceextension Extension
Other software / Other software solutions

Azure Arc Cluster microsoft.iotoperations.mq Extension
Other software / Other software solutions

Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension
Other software / Other software solutions

Azure Arc Cluster microsoft.azure.hybridnetwork Extension
Other software / Other software solutions

Azure Arc Cluster microsoft.azstackhci.operator Extension
Other software / Other software solutions

Vendor Microsoft

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper access control

EUVDB-ID: #VU88367

Risk: Low

CVSSv3.1: 5.4 [CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-28917

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in Azure Arc-enabled Kubernetes Extension Cluster-Scope. A remote administrator on the local network can bypass implemented security restrictions and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Azure Arc Cluster microsoft.videoindexer Extension: All versions

Azure Arc Cluster microsoft.openservicemesh Extension: All versions

Azure Arc Cluster microsoft.networkfabricserviceextension Extension: All versions

Azure Arc Cluster microsoft.iotoperations.mq Extension: All versions

Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension: All versions

Azure Arc Cluster microsoft.azure.hybridnetwork Extension: All versions

Azure Arc Cluster microsoft.azstackhci.operator Extension: All versions

CPE2.3 External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28917


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###