CERTFR-2024-AVI-0291
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Azure Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension versions antérieures à 1.5.2
Microsoft Azure Azure Migrate versions antérieures à 6.1.294.1003
Microsoft Azure Azure Arc Cluster microsoft.videoindexer Extension versions antérieures à 1.1.2
Microsoft Azure Azure CycleCloud 8.6.0 versions antérieures à 8.6.1
Microsoft Azure Azure Arc Cluster microsoft.iotoperations.mq Extension versions antérieures à 0.3.0-preview
Microsoft Azure Azure Compute Gallery
Microsoft Azure Azure Arc Cluster microsoft.azure.hybridnetwork Extension versions antérieures à 1.0.2620-162
Microsoft Azure Azure Private 5G Core versions antérieures à 2403.0-2
Microsoft Azure Azure Monitor Agent versions antérieures à 1.24.0
Microsoft Azure Azure Kubernetes Service Confidential Containers versions antérieures à 0.3.4
Microsoft Azure Azure Arc Cluster microsoft.openservicemesh Extension versions antérieures à 1.2.6
Microsoft Azure Azure Arc Cluster microsoft.azstackhci.operator Extension versions antérieures à 5.0.5
Microsoft Azure Azure Arc Cluster microsoft.networkfabricserviceextension Extension versions antérieures à 5.1.3
Microsoft Azure Azure Identity Library pour .NET versions antérieures à 1.11.0
Microsoft Azure Azure AI Search

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension versions ant\u00e9rieures \u00e0 1.5.2",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Migrate versions ant\u00e9rieures \u00e0 6.1.294.1003",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Arc Cluster microsoft.videoindexer Extension versions ant\u00e9rieures \u00e0 1.1.2",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure CycleCloud 8.6.0 versions ant\u00e9rieures \u00e0 8.6.1",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Arc Cluster microsoft.iotoperations.mq Extension versions ant\u00e9rieures \u00e0 0.3.0-preview",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Compute Gallery",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Arc Cluster microsoft.azure.hybridnetwork Extension versions ant\u00e9rieures \u00e0 1.0.2620-162",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Private 5G Core versions ant\u00e9rieures \u00e0 2403.0-2",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Monitor Agent versions ant\u00e9rieures \u00e0 1.24.0",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Kubernetes Service Confidential Containers versions ant\u00e9rieures \u00e0 0.3.4",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Arc Cluster microsoft.openservicemesh Extension versions ant\u00e9rieures \u00e0 1.2.6",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Arc Cluster microsoft.azstackhci.operator Extension versions ant\u00e9rieures \u00e0 5.0.5",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Arc Cluster microsoft.networkfabricserviceextension Extension versions ant\u00e9rieures \u00e0 5.1.3",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure Identity Library pour .NET versions ant\u00e9rieures \u00e0 1.11.0",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Azure AI Search",
      "product": {
        "name": "Azure",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-29063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29063"
    },
    {
      "name": "CVE-2024-29993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29993"
    },
    {
      "name": "CVE-2024-29989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29989"
    },
    {
      "name": "CVE-2024-21424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21424"
    },
    {
      "name": "CVE-2024-29990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29990"
    },
    {
      "name": "CVE-2024-29992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29992"
    },
    {
      "name": "CVE-2024-26193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26193"
    },
    {
      "name": "CVE-2024-20685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20685"
    },
    {
      "name": "CVE-2024-28917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28917"
    }
  ],
  "initial_release_date": "2024-04-10T00:00:00",
  "last_revision_date": "2024-04-10T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29989 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29989"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28917 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28917"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20685 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20685"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21424 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21424"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29993 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29993"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26193 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26193"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29992 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29992"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29990 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29990"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29063 du 09 avril 2024",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29063"
    }
  ],
  "reference": "CERTFR-2024-AVI-0291",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Azure\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure du 09 avril 2024",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…