Cyber Posture

CVE-2025-24049

High

Published: 11 March 2025

Published
11 March 2025
Modified
02 July 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-24049 is a command injection vulnerability (CWE-77) in Azure Command Line Integration (CLI), resulting from improper neutralization of special elements used in a command. This flaw affects the Azure CLI component and was published on 2025-03-11, carrying a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A local attacker requires no privileges (PR:N) to exploit the vulnerability, which demands low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables local privilege escalation, granting high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) without changing scope (S:U).

Microsoft's security advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049 details mitigation strategies and available patches.

Details

CWE(s)
CWE-77

Affected Products

microsoft
azure command-line interface
≤ 2.69.0

MITRE ATT&CK Enterprise Techniques

T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Command injection vulnerability in Azure CLI directly enables arbitrary command execution via T1059 and local privilege escalation via T1068.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References