Skip to main content

CVE-2022-35780: Elevation of Privilege in Microsoft Azure Site Recovery VMWare to Azure

Medium
VulnerabilityCVE-2022-35780cvecve-2022-35780
Published: Tue Aug 09 2022 (08/09/2022, 19:59:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Site Recovery VMWare to Azure

Description

Azure Site Recovery Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/07/2025, 22:41:47 UTC

Technical Analysis

CVE-2022-35780 is an elevation of privilege vulnerability identified in Microsoft Azure Site Recovery's VMWare to Azure replication feature, specifically affecting version 9.0. This vulnerability is categorized under CWE-269, which relates to improper privileges or permissions management. The flaw allows an attacker with existing high-level privileges (PR:H) but no user interaction (UI:N) to escalate their privileges further, potentially gaining unauthorized control or capabilities within the Azure Site Recovery environment. The attack vector is network-based (AV:N), meaning the vulnerability can be exploited remotely over the network without physical access. The vulnerability impacts the integrity and availability of the system, as indicated by the CVSS vector (I:H/A:H), but does not affect confidentiality (C:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other components or systems. The exploitability is considered partially functional (E:P), and the vulnerability has official remediation (RL:O) with confirmed reports (RC:C). No known exploits are currently active in the wild, and no official patches are linked in the provided data, suggesting organizations should verify and apply any available updates from Microsoft. The vulnerability could allow an attacker to disrupt replication processes or manipulate recovery operations, potentially causing significant operational impact in disaster recovery scenarios.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises relying on Azure Site Recovery for business continuity and disaster recovery involving VMWare to Azure migrations or replications. Successful exploitation could lead to unauthorized modification or disruption of replication tasks, potentially causing data loss, downtime, or failure to recover critical systems during outages. This could affect sectors with stringent uptime and data integrity requirements such as finance, healthcare, and critical infrastructure. Additionally, disruption in recovery processes could lead to regulatory compliance issues under GDPR and other data protection laws if data availability or integrity is compromised. Given the network-based attack vector and the need for high privileges, insider threats or compromised administrative accounts could be leveraged to exploit this vulnerability, increasing the risk profile for organizations with complex cloud environments.

Mitigation Recommendations

European organizations should immediately verify the version of Azure Site Recovery in use and prioritize upgrading to a patched version once available from Microsoft. In the absence of an official patch, organizations should enforce strict access controls and monitoring on accounts with high privileges related to Azure Site Recovery, including multi-factor authentication and least privilege principles. Network segmentation and firewall rules should restrict access to Azure Site Recovery management interfaces to trusted IP ranges only. Regular auditing of replication and recovery logs can help detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten role-based access controls (RBAC) within Azure to minimize the number of users with elevated privileges. Implementing robust incident response plans specific to cloud recovery environments will also help mitigate potential impacts if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2022-07-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838aece182aa0cae28a0d1e

Added to database: 5/29/2025, 7:00:30 PM

Last enriched: 7/7/2025, 10:41:47 PM

Last updated: 8/1/2025, 12:27:26 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats