CVE-2025-47989

7.0 HIGH

📋 TL;DR

This vulnerability in Azure Connected Machine Agent allows an authenticated attacker with local access to a machine to escalate privileges, potentially gaining administrative control. It affects systems running the vulnerable agent version. Organizations using Azure Arc-enabled servers are primarily impacted.

💻 Affected Systems

Products:
  • Azure Connected Machine Agent
Versions: Versions prior to 1.45.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Azure Arc-enabled servers and hybrid machines managed through Azure Arc.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the machine, enabling lateral movement, data theft, and persistence establishment.

🟠

Likely Case

An authenticated user elevates privileges to install malware, access sensitive data, or modify system configurations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: LOW - Exploitation requires local access to the machine.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.45.0 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989

Restart Required: Yes

Instructions:

1. Update Azure Connected Machine Agent to version 1.45.0 or later. 2. On Windows: Use Azure Arc agent update mechanism or download from Microsoft Update. 3. On Linux: Use package manager or Azure Arc update script. 4. Restart the machine after update.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to machines running the vulnerable agent.

Monitor Privilege Escalation Attempts

windows

Enable auditing for privilege escalation events and service modifications.

auditpol /set /subcategory:"Privilege Use" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for local users.
  • Monitor for unusual process creation or privilege escalation patterns.

🔍 How to Verify

Check if Vulnerable:

Check Azure Connected Machine Agent version. On Windows: Check 'AzureConnectedMachineAgent' service version. On Linux: Check package version or run 'azcmagent version'.

Check Version:

Windows: Get-WmiObject Win32_Service -Filter "Name='AzureConnectedMachineAgent'" | Select-Object Name, PathName. Linux: azcmagent version

Verify Fix Applied:

Confirm agent version is 1.45.0 or later. Verify no unauthorized privilege escalation attempts in logs.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Azure Connected Machine Agent service modifications
  • Unauthorized process execution with elevated privileges

Network Indicators:

  • Unusual outbound connections from Azure Arc-managed machines

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%azcmagent%' AND SubjectUserName NOT IN (authorized_users)

🔗 References

📤 Share & Export