CVE-2024-21638

Azure IPAM (IP Address Management) is a lightweight solution developed on top of the Azure platform designed to help Azure customers manage their IP Address space easily and effectively. By design there is no write access to customers' Azure environments as the Service Principal used is only assigned the Reader role at the root Management Group level. Until recently, the solution lacked the validation of the passed in authentication token which may result in attacker impersonating any privileged user to access data stored within the IPAM instance and subsequently from Azure, causing an elevation of privilege. This vulnerability has been patched in version 3.0.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:azure_ipam:*:*:*:*:*:*:*:*

History

19 Jan 2024, 19:03

Type Values Removed Values Added
First Time Microsoft azure Ipam
Microsoft
CWE CWE-269 CWE-287
CPE cpe:2.3:a:microsoft:azure_ipam:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/Azure/ipam/security/advisories/GHSA-m8mp-jq4c-g8j6 - () https://github.com/Azure/ipam/security/advisories/GHSA-m8mp-jq4c-g8j6 - Mitigation, Vendor Advisory
References () https://github.com/Azure/ipam/pull/218 - () https://github.com/Azure/ipam/pull/218 - Patch
References () https://github.com/Azure/ipam/commit/64ef2d07edf16ffa50f29c7e0e25d32d974b367f - () https://github.com/Azure/ipam/commit/64ef2d07edf16ffa50f29c7e0e25d32d974b367f - Patch

10 Jan 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-10 22:15

Updated : 2024-01-19 19:03


NVD link : CVE-2024-21638

Mitre link : CVE-2024-21638


JSON object : View

Products Affected

microsoft

  • azure_ipam
CWE
CWE-287

Improper Authentication