Advisory Details

December 21st, 2021

Microsoft Azure Defender for IoT sync Endpoint SQL Injection Authentication Bypass Vulnerability

ZDI-21-1555
ZDI-CAN-14159

CVE ID CVE-2021-42313
CVSS SCORE 9.8, (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Azure Defender for IoT
VULNERABILITY DETAILS

This vulnerability allows remote attackers to bypass authentication on affected installations of Microsoft Azure Defender for IoT. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the sync endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to bypass authentication on the system and execute arbitrary code in the context of root.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42313
DISCLOSURE TIMELINE
  • 2021-09-17 - Vulnerability reported to vendor
  • 2021-12-21 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES