Vulnerability Description
Azure AD Connect Password writeback, if misconfigured during enablement, allows an attacker to reset passwords and gain unauthorized access to arbitrary on-premises AD privileged user accounts aka "Azure AD Connect Elevation of Privilege Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Azure Active Directory Connect | <= 1.1.524.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99294Third Party AdvisoryVDB Entry
- https://technet.microsoft.com/library/security/4033453MitigationVendor Advisory
- http://www.securityfocus.com/bid/99294Third Party AdvisoryVDB Entry
- https://technet.microsoft.com/library/security/4033453MitigationVendor Advisory
FAQ
What is CVE-2017-8613?
CVE-2017-8613 is a vulnerability with a CVSS score of 8.1 (HIGH). Azure AD Connect Password writeback, if misconfigured during enablement, allows an attacker to reset passwords and gain unauthorized access to arbitrary on-premises AD privileged user accounts aka "Az...
How severe is CVE-2017-8613?
CVE-2017-8613 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8613?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Azure Active Directory Connect.