CVE-2023-38155

7.0 HIGH

📋 TL;DR

CVE-2023-38155 is a remote code execution vulnerability in Azure DevOps Server that allows authenticated attackers to execute arbitrary code on affected servers. This affects organizations running vulnerable versions of Azure DevOps Server, potentially compromising build pipelines, source code repositories, and development infrastructure.

💻 Affected Systems

Products:
  • Azure DevOps Server
Versions: 2020.0 through 2020.1.2, 2022.0 through 2022.0.1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker authentication; Azure DevOps Services (cloud version) is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Azure DevOps Server instance leading to source code theft, build pipeline manipulation, lateral movement to connected systems, and persistent backdoor installation.

🟠

Likely Case

Attackers gain control over build pipelines to inject malicious code into software artifacts, steal intellectual property, or disrupt development operations.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal privileges, and monitoring, potentially only affecting isolated development environments.

🌐 Internet-Facing: HIGH if Azure DevOps Server is exposed to the internet, as authenticated attackers can exploit remotely.
🏢 Internal Only: MEDIUM for internal networks, requiring attacker to first gain network access or compromise internal credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access; exploitation details not publicly disclosed as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Azure DevOps Server 2020.1.2 Patch 4, Azure DevOps Server 2022.0.1 Patch 1

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38155

Restart Required: Yes

Instructions:

1. Download the security update from Microsoft Update Catalog. 2. Apply the patch to all affected Azure DevOps Server instances. 3. Restart the server to complete installation. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Azure DevOps Server to only trusted IP ranges and users.

Configure firewall rules to limit inbound connections to Azure DevOps Server ports (default 8080, 443)

Authentication Hardening

all

Implement multi-factor authentication and review user permissions to minimize attack surface.

Enable MFA for all Azure DevOps accounts, review and remove unnecessary administrative privileges

🧯 If You Can't Patch

  • Isolate Azure DevOps Server from internet and restrict internal network access to development teams only.
  • Implement strict monitoring for unusual build pipeline activities and authentication attempts.

🔍 How to Verify

Check if Vulnerable:

Check Azure DevOps Server version in Administration > Server Settings; vulnerable if version is 2020.0-2020.1.2 or 2022.0-2022.0.1 without patches.

Check Version:

Not applicable via command line; check through Azure DevOps web interface Administration section.

Verify Fix Applied:

Verify version shows 2020.1.2 Patch 4 or 2022.0.1 Patch 1 in Administration > Server Settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual build pipeline executions, unexpected process creations on Azure DevOps Server, authentication from suspicious IPs

Network Indicators:

  • Unusual outbound connections from Azure DevOps Server, spikes in traffic to build agent ports

SIEM Query:

Example: 'source="AzureDevOps" AND (event_type="PipelineExecution" AND result="Failed") | stats count by user, ip'

🔗 References

📤 Share & Export