Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-21400 (GCVE-0-2024-21400)
Vulnerability from cvelistv5 – Published: 2024-03-12 16:57 – Updated: 2025-05-03 00:46- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| URL | Tags |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Microsoft | Azure Kubernetes Service |
Affected:
1.0.0 , < 0.3.3
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21400",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-12T19:22:29.488307Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-07T19:36:49.362Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:20:40.636Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "Azure Kubernetes Service",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "0.3.3",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_kubernetes_service_confidential_containers:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.3",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2024-03-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-03T00:46:55.364Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
}
],
"title": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2024-21400",
"datePublished": "2024-03-12T16:57:58.625Z",
"dateReserved": "2023-12-08T22:45:20.455Z",
"dateUpdated": "2025-05-03T00:46:55.364Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-21400",
"date": "2026-05-22",
"epss": "0.01623",
"percentile": "0.82078"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:confidental_containers:*:*:*:*:*:azure_cli:*:*\", \"versionEndExcluding\": \"0.3.3\", \"matchCriteriaId\": \"4B81287D-AEDC-40F4-BDFE-3E4A3E76B91E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de elevaci\\u00f3n de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes\"}]",
"id": "CVE-2024-21400",
"lastModified": "2024-11-29T20:52:31.103",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 6.0}]}",
"published": "2024-03-12T17:15:49.797",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-21400\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2024-03-12T17:15:49.797\",\"lastModified\":\"2024-11-29T20:52:31.103\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de elevaci\u00f3n de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:confidental_containers:*:*:*:*:*:azure_cli:*:*\",\"versionEndExcluding\":\"0.3.3\",\"matchCriteriaId\":\"4B81287D-AEDC-40F4-BDFE-3E4A3E76B91E\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400\", \"name\": \"Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:20:40.636Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21400\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-12T19:22:29.488307Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-07T19:36:47.275Z\"}}], \"cna\": {\"title\": \"Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 9, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Kubernetes Service\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"lessThan\": \"0.3.3\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}], \"datePublic\": \"2024-03-12T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400\", \"name\": \"Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_kubernetes_service_confidential_containers:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"0.3.3\", \"versionStartIncluding\": \"1.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-05-03T00:46:55.364Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21400\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-03T00:46:55.364Z\", \"dateReserved\": \"2023-12-08T22:45:20.455Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2024-03-12T16:57:58.625Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-0207
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une usurpation d'identité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure Sentinel versions antérieures à OMS Agent pour Linux GA v1.19.0 | ||
| Microsoft | Azure | Azure SDK versions antérieures à 1.29.5 | ||
| Microsoft | Azure | Azure Kubernetes Service Confidential Containers versions antérieures à 0.3.3 | ||
| Microsoft | Azure | Azure Automation Update Management versions antérieures à OMS Agent pour Linux GA v1.19.0 | ||
| Microsoft | Azure | Azure Data Studio versions antérieures à 1.48.0 | ||
| Microsoft | Azure | Azure Security Center versions antérieures à OMS Agent pour Linux GA 1.19.0 | ||
| Microsoft | Azure | Azure Automation versions antérieures à OMS Agent pour Linux GA 1.19.0 |
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Sentinel versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA v1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure SDK versions ant\u00e9rieures \u00e0 1.29.5",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Kubernetes Service Confidential Containers versions ant\u00e9rieures \u00e0 0.3.3",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Automation Update Management versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA v1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Data Studio versions ant\u00e9rieures \u00e0 1.48.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Security Center versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA 1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Automation versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA 1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-21400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21400"
},
{
"name": "CVE-2024-21330",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21330"
},
{
"name": "CVE-2024-21421",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21421"
},
{
"name": "CVE-2024-26203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26203"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21400 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26203 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26203"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21330 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21421 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21421"
}
],
"reference": "CERTFR-2024-AVI-0207",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Azure\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une usurpation d\u0027identit\u00e9 et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure du 12 mars 2024",
"url": null
}
]
}
CERTFR-2024-AVI-0207
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une usurpation d'identité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure Sentinel versions antérieures à OMS Agent pour Linux GA v1.19.0 | ||
| Microsoft | Azure | Azure SDK versions antérieures à 1.29.5 | ||
| Microsoft | Azure | Azure Kubernetes Service Confidential Containers versions antérieures à 0.3.3 | ||
| Microsoft | Azure | Azure Automation Update Management versions antérieures à OMS Agent pour Linux GA v1.19.0 | ||
| Microsoft | Azure | Azure Data Studio versions antérieures à 1.48.0 | ||
| Microsoft | Azure | Azure Security Center versions antérieures à OMS Agent pour Linux GA 1.19.0 | ||
| Microsoft | Azure | Azure Automation versions antérieures à OMS Agent pour Linux GA 1.19.0 |
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Sentinel versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA v1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure SDK versions ant\u00e9rieures \u00e0 1.29.5",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Kubernetes Service Confidential Containers versions ant\u00e9rieures \u00e0 0.3.3",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Automation Update Management versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA v1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Data Studio versions ant\u00e9rieures \u00e0 1.48.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Security Center versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA 1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Automation versions ant\u00e9rieures \u00e0 OMS Agent pour Linux GA 1.19.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-21400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21400"
},
{
"name": "CVE-2024-21330",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21330"
},
{
"name": "CVE-2024-21421",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21421"
},
{
"name": "CVE-2024-26203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26203"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21400 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26203 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26203"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21330 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21421 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21421"
}
],
"reference": "CERTFR-2024-AVI-0207",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Azure\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une usurpation d\u0027identit\u00e9 et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure du 12 mars 2024",
"url": null
}
]
}
BDU:2024-02227
Vulnerability from fstec - Published: 12.03.2024{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Azure Kubernetes Service Confidential Containers)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.03.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "22.03.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "22.03.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-02227",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-21400",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Azure Kubernetes Service Confidential Containers",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u043c\u0438 Azure Kubernetes Service Confidential Containers, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (CWE-264)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430\u043c\u0438 Azure Kubernetes Service Confidential Containers \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-264",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,6)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9)"
}
FKIE_CVE-2024-21400
Vulnerability from fkie_nvd - Published: 2024-03-12 17:15 - Updated: 2024-11-29 20:52| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | confidental_containers | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:confidental_containers:*:*:*:*:*:azure_cli:*:*",
"matchCriteriaId": "4B81287D-AEDC-40F4-BDFE-3E4A3E76B91E",
"versionEndExcluding": "0.3.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes"
}
],
"id": "CVE-2024-21400",
"lastModified": "2024-11-29T20:52:31.103",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2024-03-12T17:15:49.797",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-C49C-7XHW-623R
Vulnerability from github – Published: 2024-03-12 18:31 – Updated: 2024-03-12 18:31Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
{
"affected": [],
"aliases": [
"CVE-2024-21400"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-12T17:15:49Z",
"severity": "CRITICAL"
},
"details": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability",
"id": "GHSA-c49c-7xhw-623r",
"modified": "2024-03-12T18:31:12Z",
"published": "2024-03-12T18:31:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21400"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2024-21400
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2024-21400",
"id": "GSD-2024-21400"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-21400"
],
"details": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability",
"id": "GSD-2024-21400",
"modified": "2023-12-13T01:21:42.719574Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2024-21400",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Azure Kubernetes Service",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "1.0.0",
"version_value": "0.3.3"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-22",
"lang": "eng",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400",
"refsource": "MISC",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios del contenedor confidencial del servicio Microsoft Azure Kubernetes"
}
],
"id": "CVE-2024-21400",
"lastModified": "2024-04-11T20:15:29.170",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "secure@microsoft.com",
"type": "Primary"
}
]
},
"published": "2024-03-12T17:15:49.797",
"references": [
{
"source": "secure@microsoft.com",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
}
}
}
MSRC_CVE-2024-21400
Vulnerability from csaf_microsoft - Published: 2024-03-12 07:00 - Updated: 2024-03-12 07:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Azure Kubernetes Service Confidential Containers 0.3.3
Azure Kubernetes Service Confidential Containers
|
0.3.3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Azure Kubernetes Service Confidential Containers <0.3.3
Azure Kubernetes Service Confidential Containers
|
<0.3.3 |
Vendor Fix
fix
|
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://twitter.com/yuvalavra\"\u003eYuval Avrahami\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
},
{
"category": "self",
"summary": "CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2024/msrc_cve-2024-21400.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2024-03-12T07:00:00.000Z",
"generator": {
"date": "2025-05-03T00:46:37.522Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-21400",
"initial_release_date": "2024-03-12T07:00:00.000Z",
"revision_history": [
{
"date": "2024-03-12T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c0.3.3",
"product": {
"name": "Azure Kubernetes Service Confidential Containers \u003c0.3.3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "0.3.3",
"product": {
"name": "Azure Kubernetes Service Confidential Containers 0.3.3",
"product_id": "12288"
}
}
],
"category": "product_name",
"name": "Azure Kubernetes Service Confidential Containers"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21400",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.",
"title": "According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?"
},
{
"category": "faq",
"text": "No. An unauthenticated attacker can move the same workload onto a machine they control, where the attacker is root.",
"title": "According to the CVSS metric, privileges required is none (PR:N). Does the attacker need to be authenticated?"
},
{
"category": "faq",
"text": "An attacker who successfully exploited this vulnerability could steal credentials and affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC).",
"title": "According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?"
},
{
"category": "faq",
"text": "Customer must ensure they are running the latest version of az confcom and Kata Image.\nCustomers who do not have az confcom installed can install the latest version by executing az extension add -n confcom. Customers who are running versions prior to 0.3.3 need to update by executing az extension update -n confcom. For more information, reference:\nConfidential computing plugin for Confidential VMs., https://learn.microsoft.com/en-us/cli/azure/extension?view=azure-cli-latest#az-extension-update, https://github.com/Azure/AgentBaker/blob/master/vhdbuilder/release-notes/AKSCBLMarinerV2/gen2kata/202402.26.0.txt",
"title": "Is there any action I need to take to be protected from this vulnerability?"
},
{
"category": "faq",
"text": "An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to.",
"title": "How could an attacker exploit this vulnerability?"
}
],
"product_status": {
"fixed": [
"12288"
],
"known_affected": [
"1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21400"
},
{
"category": "self",
"summary": "CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2024/msrc_cve-2024-21400.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-12T07:00:00.000Z",
"details": "0.3.3:Security Update:https://learn.microsoft.com/en-us/cli/azure/confcom?view=azure-cli-latest",
"product_ids": [
"1"
],
"url": "https://learn.microsoft.com/en-us/cli/azure/confcom?view=azure-cli-latest"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "CHANGED",
"temporalScore": 8.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability"
}
]
}
WID-SEC-W-2024-0612
Vulnerability from csaf_certbund - Published: 2024-03-12 23:00 - Updated: 2024-05-01 22:00In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Sentinel
Microsoft / Azure
|
cpe:/a:microsoft:azure:sentinel
|
Sentinel | |
|
Microsoft Azure Security Center
Microsoft / Azure
|
cpe:/a:microsoft:azure:security_center
|
Security Center | |
|
IBM QRadar SIEM 7.3.3-7.5.0
IBM / QRadar SIEM
|
cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0
|
7.3.3-7.5.0 | |
|
Microsoft Azure Automation Update Management
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation_update_management
|
Automation Update Management | |
|
Microsoft Azure Data Studio
Microsoft / Azure
|
cpe:/a:microsoft:azure:data_studio
|
Data Studio | |
|
Microsoft Azure Automation
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation
|
Automation | |
|
Microsoft Azure Kubernetes Service Confidential Containers
Microsoft / Azure
|
cpe:/a:microsoft:azure:kubernetes_service_confidential_containers
|
Kubernetes Service Confidential Containers | |
|
Microsoft Azure SDK
Microsoft / Azure
|
cpe:/a:microsoft:azure:sdk
|
SDK |
In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Sentinel
Microsoft / Azure
|
cpe:/a:microsoft:azure:sentinel
|
Sentinel | |
|
Microsoft Azure Security Center
Microsoft / Azure
|
cpe:/a:microsoft:azure:security_center
|
Security Center | |
|
IBM QRadar SIEM 7.3.3-7.5.0
IBM / QRadar SIEM
|
cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0
|
7.3.3-7.5.0 | |
|
Microsoft Azure Automation Update Management
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation_update_management
|
Automation Update Management | |
|
Microsoft Azure Data Studio
Microsoft / Azure
|
cpe:/a:microsoft:azure:data_studio
|
Data Studio | |
|
Microsoft Azure Automation
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation
|
Automation | |
|
Microsoft Azure Kubernetes Service Confidential Containers
Microsoft / Azure
|
cpe:/a:microsoft:azure:kubernetes_service_confidential_containers
|
Kubernetes Service Confidential Containers | |
|
Microsoft Azure SDK
Microsoft / Azure
|
cpe:/a:microsoft:azure:sdk
|
SDK |
In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Sentinel
Microsoft / Azure
|
cpe:/a:microsoft:azure:sentinel
|
Sentinel | |
|
Microsoft Azure Security Center
Microsoft / Azure
|
cpe:/a:microsoft:azure:security_center
|
Security Center | |
|
IBM QRadar SIEM 7.3.3-7.5.0
IBM / QRadar SIEM
|
cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0
|
7.3.3-7.5.0 | |
|
Microsoft Azure Automation Update Management
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation_update_management
|
Automation Update Management | |
|
Microsoft Azure Data Studio
Microsoft / Azure
|
cpe:/a:microsoft:azure:data_studio
|
Data Studio | |
|
Microsoft Azure Automation
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation
|
Automation | |
|
Microsoft Azure Kubernetes Service Confidential Containers
Microsoft / Azure
|
cpe:/a:microsoft:azure:kubernetes_service_confidential_containers
|
Kubernetes Service Confidential Containers | |
|
Microsoft Azure SDK
Microsoft / Azure
|
cpe:/a:microsoft:azure:sdk
|
SDK |
In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Sentinel
Microsoft / Azure
|
cpe:/a:microsoft:azure:sentinel
|
Sentinel | |
|
Microsoft Azure Security Center
Microsoft / Azure
|
cpe:/a:microsoft:azure:security_center
|
Security Center | |
|
IBM QRadar SIEM 7.3.3-7.5.0
IBM / QRadar SIEM
|
cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0
|
7.3.3-7.5.0 | |
|
Microsoft Azure Automation Update Management
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation_update_management
|
Automation Update Management | |
|
Microsoft Azure Data Studio
Microsoft / Azure
|
cpe:/a:microsoft:azure:data_studio
|
Data Studio | |
|
Microsoft Azure Automation
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation
|
Automation | |
|
Microsoft Azure Kubernetes Service Confidential Containers
Microsoft / Azure
|
cpe:/a:microsoft:azure:kubernetes_service_confidential_containers
|
Kubernetes Service Confidential Containers | |
|
Microsoft Azure SDK
Microsoft / Azure
|
cpe:/a:microsoft:azure:sdk
|
SDK |
In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Sentinel
Microsoft / Azure
|
cpe:/a:microsoft:azure:sentinel
|
Sentinel | |
|
Microsoft Azure Security Center
Microsoft / Azure
|
cpe:/a:microsoft:azure:security_center
|
Security Center | |
|
IBM QRadar SIEM 7.3.3-7.5.0
IBM / QRadar SIEM
|
cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0
|
7.3.3-7.5.0 | |
|
Microsoft Azure Automation Update Management
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation_update_management
|
Automation Update Management | |
|
Microsoft Azure Data Studio
Microsoft / Azure
|
cpe:/a:microsoft:azure:data_studio
|
Data Studio | |
|
Microsoft Azure Automation
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation
|
Automation | |
|
Microsoft Azure Kubernetes Service Confidential Containers
Microsoft / Azure
|
cpe:/a:microsoft:azure:kubernetes_service_confidential_containers
|
Kubernetes Service Confidential Containers | |
|
Microsoft Azure SDK
Microsoft / Azure
|
cpe:/a:microsoft:azure:sdk
|
SDK |
In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Azure Sentinel
Microsoft / Azure
|
cpe:/a:microsoft:azure:sentinel
|
Sentinel | |
|
Microsoft Azure Security Center
Microsoft / Azure
|
cpe:/a:microsoft:azure:security_center
|
Security Center | |
|
IBM QRadar SIEM 7.3.3-7.5.0
IBM / QRadar SIEM
|
cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0
|
7.3.3-7.5.0 | |
|
Microsoft Azure Automation Update Management
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation_update_management
|
Automation Update Management | |
|
Microsoft Azure Data Studio
Microsoft / Azure
|
cpe:/a:microsoft:azure:data_studio
|
Data Studio | |
|
Microsoft Azure Automation
Microsoft / Azure
|
cpe:/a:microsoft:azure:automation
|
Automation | |
|
Microsoft Azure Kubernetes Service Confidential Containers
Microsoft / Azure
|
cpe:/a:microsoft:azure:kubernetes_service_confidential_containers
|
Kubernetes Service Confidential Containers | |
|
Microsoft Azure SDK
Microsoft / Azure
|
cpe:/a:microsoft:azure:sdk
|
SDK |
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Azure ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Microsoft Azure ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren und Informationen falsch darzustellen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0612 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0612.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0612 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0612"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-03-12",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7149967 vom 2024-05-01",
"url": "https://www.ibm.com/support/pages/node/7149967"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-05-01T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:06:22.718+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-0612",
"initial_release_date": "2024-03-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3.3-7.5.0",
"product": {
"name": "IBM QRadar SIEM 7.3.3-7.5.0",
"product_id": "T034489",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.3.3_-_7.5.0"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Automation",
"product": {
"name": "Microsoft Azure Automation",
"product_id": "T033405",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:automation"
}
}
},
{
"category": "product_version",
"name": "Automation Update Management",
"product": {
"name": "Microsoft Azure Automation Update Management",
"product_id": "T033406",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:automation_update_management"
}
}
},
{
"category": "product_version",
"name": "Data Studio",
"product": {
"name": "Microsoft Azure Data Studio",
"product_id": "T033407",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:data_studio"
}
}
},
{
"category": "product_version",
"name": "Kubernetes Service Confidential Containers",
"product": {
"name": "Microsoft Azure Kubernetes Service Confidential Containers",
"product_id": "T033409",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:kubernetes_service_confidential_containers"
}
}
},
{
"category": "product_version",
"name": "SDK",
"product": {
"name": "Microsoft Azure SDK",
"product_id": "T033410",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:sdk"
}
}
},
{
"category": "product_version",
"name": "Security Center",
"product": {
"name": "Microsoft Azure Security Center",
"product_id": "T033412",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:security_center"
}
}
},
{
"category": "product_version",
"name": "Sentinel",
"product": {
"name": "Microsoft Azure Sentinel",
"product_id": "T033413",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:sentinel"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21330",
"notes": [
{
"category": "description",
"text": "In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und Informationen falsch darzustellen."
}
],
"product_status": {
"known_affected": [
"T033413",
"T033412",
"T034489",
"T033406",
"T033407",
"T033405",
"T033409",
"T033410"
]
},
"release_date": "2024-03-12T23:00:00.000+00:00",
"title": "CVE-2024-21330"
},
{
"cve": "CVE-2024-21334",
"notes": [
{
"category": "description",
"text": "In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und Informationen falsch darzustellen."
}
],
"product_status": {
"known_affected": [
"T033413",
"T033412",
"T034489",
"T033406",
"T033407",
"T033405",
"T033409",
"T033410"
]
},
"release_date": "2024-03-12T23:00:00.000+00:00",
"title": "CVE-2024-21334"
},
{
"cve": "CVE-2024-21400",
"notes": [
{
"category": "description",
"text": "In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und Informationen falsch darzustellen."
}
],
"product_status": {
"known_affected": [
"T033413",
"T033412",
"T034489",
"T033406",
"T033407",
"T033405",
"T033409",
"T033410"
]
},
"release_date": "2024-03-12T23:00:00.000+00:00",
"title": "CVE-2024-21400"
},
{
"cve": "CVE-2024-21418",
"notes": [
{
"category": "description",
"text": "In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und Informationen falsch darzustellen."
}
],
"product_status": {
"known_affected": [
"T033413",
"T033412",
"T034489",
"T033406",
"T033407",
"T033405",
"T033409",
"T033410"
]
},
"release_date": "2024-03-12T23:00:00.000+00:00",
"title": "CVE-2024-21418"
},
{
"cve": "CVE-2024-21421",
"notes": [
{
"category": "description",
"text": "In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und Informationen falsch darzustellen."
}
],
"product_status": {
"known_affected": [
"T033413",
"T033412",
"T034489",
"T033406",
"T033407",
"T033405",
"T033409",
"T033410"
]
},
"release_date": "2024-03-12T23:00:00.000+00:00",
"title": "CVE-2024-21421"
},
{
"cve": "CVE-2024-26203",
"notes": [
{
"category": "description",
"text": "In Microsoft Azure existieren mehrere Schwachstellen. Die Schwachstellen bestehen aufgrund eines use-after-free Fehlers und zahlreicher unbeschriebener Fehler. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, seine Privilegien zu erweitern und Informationen falsch darzustellen."
}
],
"product_status": {
"known_affected": [
"T033413",
"T033412",
"T034489",
"T033406",
"T033407",
"T033405",
"T033409",
"T033410"
]
},
"release_date": "2024-03-12T23:00:00.000+00:00",
"title": "CVE-2024-26203"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.