Impact
Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally on Arc‑enabled Windows VMs. The vulnerability corresponds to CWE-287 (Authentication Bypass) and CWE-863 (Privilege Escalation), enabling a local attacker to assume higher privileges, thereby compromising confidentiality, integrity, and availability of the affected system.
Affected Systems
Products affected are Microsoft Azure Automation Hybrid Worker Windows Extension (Arc‑enabled Windows VMs). No specific version information is provided in the CVE entry; users should review the Microsoft advisory to determine which deployed versions are vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score of less than 1% suggests a low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires an authenticated attacker with local access to the VM; there is no evidence of remote exploitation.
OpenCVE Enrichment