An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the Azure AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'.
References
| Link | Resource |
|---|---|
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1000 | Patch Vendor Advisory |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1000 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2019-05-16 19:29
Updated : 2024-11-21 04:35
NVD link : CVE-2019-1000
Mitre link : CVE-2019-1000
CVE.ORG link : CVE-2019-1000
JSON object : View
Products Affected
microsoft
- azure_active_directory_connect
CWE
CWE-269
Improper Privilege Management
