Impact
External control of file name or path in the Azure Monitor Agent allows an authorized attacker to create or modify files in a location that grants elevated privileges, leading to local privilege escalation. The vulnerability is modeled by CWE-73, which denotes path manipulation weaknesses that can be abused to bypass security controls. The attacker requires some level of authorization to the system, but can leverage the flaw to gain higher privileges, potentially affecting the confidentiality, integrity, or availability of the host.
Affected Systems
Microsoft Azure Monitor Agent is vulnerable. No specific version range is listed in the CNA data, so all installed instances may be at risk unless they have received a recent update from Microsoft.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. With no EPSS score available and the vulnerability not listed in the CISA KEV catalog, the immediate likelihood of exploitation is uncertain, but the flaw still warrants attention. An authorized local attacker can exploit the path control to achieve privilege escalation, so the attack vector is inferred to be local. Enforcement of least privilege and timely application of Microsoft updates are critical to mitigate this risk.
OpenCVE Enrichment