CVE-2024-21638

CRITICAL

Microsoft Azure Ipam < 3.0.0 - Authentication Bypass

Title source: rule
STIX 2.1

Description

Azure IPAM (IP Address Management) is a lightweight solution developed on top of the Azure platform designed to help Azure customers manage their IP Address space easily and effectively. By design there is no write access to customers' Azure environments as the Service Principal used is only assigned the Reader role at the root Management Group level. Until recently, the solution lacked the validation of the passed in authentication token which may result in attacker impersonating any privileged user to access data stored within the IPAM instance and subsequently from Azure, causing an elevation of privilege. This vulnerability has been patched in version 3.0.0.

Scores

CVSS v3 9.1
EPSS 0.0355
EPSS Percentile 87.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-269 CWE-287
Status published
Products (1)
microsoft/azure_ipam < 3.0.0
Published Jan 10, 2024
Tracked Since Feb 18, 2026