MSRC compact vulnerability detail

CVE-2024-26201 · Microsoft Intune Linux Agent Elevation of Privilege Vulnerability

No description was published by MSRC.

Severity
Important
Impact
Elevation of Privilege
CVSS
6.6 base · 5.9 temporal
Release
2024-03-12
Signals
Microsoft Intune Elevation of Privilege Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires a user to modify a custom compliance script on the device after it is written to temporary storage and before execution of the script finishes.
FAQ
According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) and integrity (I:H) but not availability (A:N). What does that mean for this vulnerability? This vulnerability could allow an attacker to view potentially restricted information inside of a custom compliance script and tamper with the results of the scripts, but does not allow the attacker to make any other parts of the Intune service unavailable
FAQ
What privileges could an attacker gain by successful exploiting this vulnerability? An attacker who successfully exploited this vulnerability could alter the results of a custom compliance script, bypassing compliance checks enforced by these scripts.