Description
Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
Published: 2026-03-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Key detail from vendor description: "Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally." The vulnerability is an improper authentication flaw (CWE-288) that permits an attacker who already has some level of access to bypass normal agent authentication and gain elevated local privileges. This could allow the attacker to execute arbitrary code with higher privileges on the affected host, potentially compromising system integrity and confidentiality.

Affected Systems

Affected vendor: Microsoft. Product: Arc Enabled Servers – Azure Connected Machine Agent. The CVE data does not list specific product versions or build numbers; the vulnerability is reported for the Azure Connected Machine Agent in general. Operators should verify whether their agent deployment falls under the scope of this advisory and consult Microsoft for version details.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity rating for local privilege escalation. The EPSS score of <1% reflects a low current probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, requiring the attacker to reach the agent through its alternate communication channel or path; however, the exact conditions for exploitation are not detailed in the input. Inferred from the description, the attacker would need prior authenticated access or the ability to interact with the agent’s alternate channel.

Generated by OpenCVE AI on March 16, 2026 at 23:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft patch or upgrade to the current release of the Azure Connected Machine Agent.
  • If an immediate patch is unavailable, restrict or disable the alternate channel/path used by the agent to prevent authentication bypass.
  • Monitor agent logs for authentication attempts via non-standard paths and review network traffic for unusual agent activity.
  • Maintain up‑to‑date Microsoft advisories and follow any further vendor guidance for mitigation.

Generated by OpenCVE AI on March 16, 2026 at 23:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other

Tue, 10 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.
Title Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft arc Enabled Servers Azure Connected Machine Agent
Weaknesses CWE-288
CPEs cpe:2.3:a:microsoft:arc_enabled_servers_azure_connected_machine_agent:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft arc Enabled Servers Azure Connected Machine Agent
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Arc Enabled Servers Azure Connected Machine Agent
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-03-27T22:33:16.945Z

Reserved: 2026-02-11T15:52:13.911Z

Link: CVE-2026-26117

cve-icon Vulnrichment

Updated: 2026-03-10T18:39:48.729Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:41.017

Modified: 2026-03-13T20:14:21.453

Link: CVE-2026-26117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:34:02Z

Weaknesses