CVE-2024-21364

9.3 CRITICAL

📋 TL;DR

This vulnerability in Microsoft Azure Site Recovery allows authenticated attackers to elevate privileges within the Azure environment, potentially gaining administrative control over recovery operations. It affects organizations using Azure Site Recovery for disaster recovery scenarios.

💻 Affected Systems

Products:
  • Microsoft Azure Site Recovery
Versions: All versions prior to patched release
Operating Systems: Azure cloud platform
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to Azure Site Recovery service

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over Azure Site Recovery infrastructure, allowing them to manipulate recovery operations, access protected data, and potentially compromise connected on-premises systems.

🟠

Likely Case

Privileged users or compromised accounts abuse the vulnerability to gain unauthorized access to recovery configurations and sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users who might abuse legitimate privileges.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of Azure Site Recovery operations

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest Azure Site Recovery update

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21364

Restart Required: No

Instructions:

1. Log into Azure Portal 2. Navigate to Azure Site Recovery 3. Check for and apply available updates 4. Verify service is running latest version

🔧 Temporary Workarounds

Restrict Access Controls

all

Implement strict role-based access control (RBAC) to limit who can access Azure Site Recovery operations

az role assignment create --assignee <user> --role "Site Recovery Contributor" --scope <resource>

Enable Audit Logging

all

Enable detailed audit logging for all Site Recovery operations to detect suspicious activity

az monitor diagnostic-settings create --resource <resource-id> --name "SiteRecoveryAudit" --logs '[{"category":"AuditEvent","enabled":true}]'

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all Azure Site Recovery users
  • Enable multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check Azure Site Recovery service version in Azure Portal under Service Settings

Check Version:

az resource show --ids /subscriptions/{sub-id}/resourceGroups/{rg}/providers/Microsoft.RecoveryServices/vaults/{vault} --query properties.serviceVersion

Verify Fix Applied:

Verify service shows latest version and no pending updates in Azure Portal

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in Azure Activity Logs
  • Unexpected role assignments for Site Recovery
  • Suspicious configuration changes to recovery plans

Network Indicators:

  • Unusual API calls to Site Recovery endpoints from unexpected locations

SIEM Query:

AzureActivity | where OperationNameValue contains "Microsoft.RecoveryServices" and ActivityStatusValue == "Success" | where Caller contains suspicious_user

🔗 References

📤 Share & Export