Impact
This vulnerability stems from a path traversal flaw that allows an attacker who can supply or influence file paths to bypass directory restrictions. By crafting a malicious path, an unauthorized user can access files outside the intended sandbox, effectively lifting their privileges over the affected network. The security impact is a direct escalation of privileges, potentially granting the attacker unauthorized read, write, or execute access to sensitive resources and data integrity violations.
Affected Systems
Microsoft Azure Logic Apps is the affected product. No specific version range is provided in the CNA data, so all current and future deployments of Azure Logic Apps that have not applied the patch are considered at risk.
Risk and Exploitability
The CVSS score of 8.2 indicates a high severity, while the EPSS score of less than 1% suggests exploitation is currently unlikely but possible. The vulnerability is not listed in the CISA KEV catalog, which may imply limited active exploitation. Based on the description, the likely attack vector is remote, where an attacker sends a crafted request to the Logic Apps service. The absence of an explicit CNA solution in the input indicates that Microsoft has likely released a patch; therefore, the vulnerability can be mitigated by staying updated with the latest Azure patch releases.
OpenCVE Enrichment