SB2020111025 - Multiple vulnerabilities in Microsoft Azure Sphere 



SB2020111025 - Multiple vulnerabilities in Microsoft Azure Sphere

Published: November 10, 2020

Security Bulletin ID SB2020111025
Severity
Low
Patch available
YES
Number of vulnerabilities 15
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 15 secuirty vulnerabilities.


1) Code Injection (CVE-ID: CVE-2020-16970)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16983)

The vulnerability allows an administator with physical access to escalate privileges on the system.

The vulnerability exists due to a tampering issue, which leads to security restrictions bypass and privilege escalation.


3) Code Injection (CVE-ID: CVE-2020-16994)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16993)

The vulnerability allows an administrator with physical access to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16992)

The vulnerability allows a local administrator to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


6) Code Injection (CVE-ID: CVE-2020-16991)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Information disclosure (CVE-ID: CVE-2020-16990)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local attacker can gain unauthorized access to sensitive information on the system.


8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16989)

The vulnerability allows an administrator with physical access to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16988)

The vulnerability allows an administrator with physical access to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.


10) Code Injection (CVE-ID: CVE-2020-16987)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


11) Information disclosure (CVE-ID: CVE-2020-16985)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local attacker can gain unauthorized access to sensitive information on the system.


12) Input validation error (CVE-ID: CVE-2020-16986)

The vulnerability allows a local attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A local attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


13) Code Injection (CVE-ID: CVE-2020-16984)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A local attacker can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Code Injection (CVE-ID: CVE-2020-16982)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. An administrator with physical access can send a specially crafted request and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


15) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16981)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions. An administrator with physical access can escalate privileges on the target system.


Remediation

Install update from vendor's website.