Impact
The vulnerability is an out‑of‑bounds write in the Azure Monitor Agent that permits an authorized attacker to execute arbitrary code on the host over a network. This flaw is classified as a high‑impact type of buffer overflow (CWE‑131 and CWE‑787), which can compromise confidentiality, integrity, and availability by allowing remote code execution on affected systems.
Affected Systems
Microsoft Azure Monitor Agents are affected. Specific product versions are not listed in the advisory, so all deployments of the Azure Monitor Agent should be investigated for the existence of this flaw until a patch is confirmed to be applied.
Risk and Exploitability
With a CVSS score of 8.8 the vulnerability is considered high severity. The EPSS score is below 1%, indicating a low probability of exploitation at the time of this analysis, and the issue is not currently listed in the CISA KEV catalog. Based on the description, the likely attack vector is a network attack that requires the attacker to be authenticated or authorized to interact with the Agent; remediation relies on patching or tightening network access to the Agent.
OpenCVE Enrichment