CVE-2025-24049

8.4 HIGH

📋 TL;DR

This command injection vulnerability in Azure CLI allows local attackers to execute arbitrary commands with elevated privileges. It affects users running vulnerable versions of Azure CLI on their systems. Attackers can exploit this to gain unauthorized access and control over affected systems.

💻 Affected Systems

Products:
  • Azure Command Line Interface (CLI)
Versions: Versions prior to 2.60.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected Azure CLI versions are vulnerable. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, allowing data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data and system resources within the compromised environment.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, potentially only affecting isolated user sessions.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Internal users or compromised accounts can exploit this to elevate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some knowledge of Azure CLI commands. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Azure CLI 2.60.0 and later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049

Restart Required: No

Instructions:

1. Update Azure CLI using: az upgrade --yes
2. Alternatively, download and install the latest version from Microsoft's official Azure CLI repository
3. Verify the update completed successfully

🔧 Temporary Workarounds

Restrict Azure CLI Usage

all

Limit Azure CLI usage to trusted users and monitor for suspicious command execution

Implement Least Privilege

all

Run Azure CLI with minimal necessary privileges and avoid administrative contexts

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute Azure CLI commands
  • Monitor Azure CLI usage and command execution patterns for anomalies

🔍 How to Verify

Check if Vulnerable:

Run 'az --version' and check if version is below 2.60.0

Check Version:

az --version

Verify Fix Applied:

Run 'az --version' and confirm version is 2.60.0 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual Azure CLI command patterns
  • Privilege escalation attempts via Azure CLI
  • Suspicious command injection patterns in Azure CLI logs

Network Indicators:

  • Unusual outbound connections following Azure CLI execution
  • Command and control traffic from systems running Azure CLI

SIEM Query:

source="azure-cli" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*" OR command="*&*" OR command="*||*")

🔗 References

📤 Share & Export