CVE-2024-21638: Azure IPAM solution Elevation of Privilege Vulnerability

9.1 CVSS

Description

Azure IPAM (IP Address Management) is a lightweight solution developed on top of the Azure platform designed to help Azure customers manage their IP Address space easily and effectively. By design there is no write access to customers' Azure environments as the Service Principal used is only assigned the Reader role at the root Management Group level. Until recently, the solution lacked the validation of the passed in authentication token which may result in attacker impersonating any privileged user to access data stored within the IPAM instance and subsequently from Azure, causing an elevation of privilege. This vulnerability has been patched in version 3.0.0.

Classification

CVE ID: CVE-2024-21638

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem Types

CWE-269: Improper Privilege Management

Affected Products

Vendor: Azure

Product: ipam

Exploit Prediction Scoring System (EPSS)

EPSS Score: 3.55% (probability of being exploited)

EPSS Percentile: 87.12% (scored less or equal to compared to others)

EPSS Date: 2025-06-05 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2024-21638
https://github.com/Azure/ipam/security/advisories/GHSA-m8mp-jq4c-g8j6
https://github.com/Azure/ipam/pull/218
https://github.com/Azure/ipam/commit/64ef2d07edf16ffa50f29c7e0e25d32d974b367f

Timeline