An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the Azure AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1000 | Patch Vendor Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1000 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1000 - Patch, Vendor Advisory |
Information
Published : 2019-05-16 19:29
Updated : 2024-11-21 04:35
NVD link : CVE-2019-1000
Mitre link : CVE-2019-1000
CVE.ORG link : CVE-2019-1000
JSON object : View
Products Affected
microsoft
- azure_active_directory_connect
CWE
CWE-269
Improper Privilege Management