CVE-2024-30059: CWE-284: Improper Access Control in Microsoft Microsoft Intune Mobile Application Management
Microsoft Intune for Android Mobile Application Management Tampering Vulnerability
AI Analysis
Technical Summary
CVE-2024-30059 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Intune Mobile Application Management (MAM) for Android, specifically version 1.0. The flaw allows a user with limited privileges (low-level privileges) to tamper with the mobile application management controls that Intune enforces on managed Android devices. The vulnerability does not require user interaction and can be exploited locally (AV:L), meaning the attacker must have local access to the device but does not need elevated privileges beyond low-level permissions. The vulnerability impacts confidentiality significantly (C:H), while integrity is not affected (I:N), and availability impact is low (A:L). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component without impacting other components. The exploitability is rated high (E:H), suggesting that once local access is obtained, exploitation is straightforward. The vulnerability has a CVSS 3.1 base score of 6.1, categorized as medium severity. No known exploits are currently reported in the wild. The vulnerability stems from improper access control mechanisms within the Intune MAM implementation, potentially allowing unauthorized access or manipulation of managed application policies or data, which could lead to exposure of sensitive corporate information or bypass of security controls enforced by Intune on Android devices.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of corporate data managed via Microsoft Intune on Android devices. Since Intune is widely used for mobile device and application management in enterprises, especially those with Bring Your Own Device (BYOD) policies, exploitation could allow attackers with local device access to bypass management policies, extract sensitive data, or tamper with application configurations. This could lead to data leakage, violation of compliance requirements such as GDPR, and potential lateral movement within corporate networks if attackers leverage compromised devices. The limited impact on integrity and availability reduces the risk of direct disruption or data manipulation, but confidentiality breaches alone can have significant regulatory and reputational consequences. The requirement for local access and low privileges means that attackers would likely need physical access or prior compromise of the device, limiting remote exploitation but increasing risk in scenarios of lost or stolen devices or insider threats.
Mitigation Recommendations
1. Ensure all Android devices managed by Microsoft Intune are updated to versions beyond 1.0 where this vulnerability is addressed, as soon as patches become available. 2. Enforce strong device access controls such as biometric or PIN authentication to reduce risk from local attackers. 3. Implement strict device enrollment and compliance policies within Intune to detect and remediate tampering attempts. 4. Use conditional access policies to restrict access to sensitive corporate resources from devices that do not meet compliance standards. 5. Educate users on the risks of device loss and encourage immediate reporting and remote wipe capabilities. 6. Monitor device logs and Intune management alerts for unusual activity indicative of tampering or policy bypass attempts. 7. Consider additional endpoint protection solutions that can detect unauthorized changes to mobile application management configurations. These steps go beyond generic patching advice by emphasizing layered security controls, user awareness, and proactive monitoring tailored to the specific nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-30059: CWE-284: Improper Access Control in Microsoft Microsoft Intune Mobile Application Management
Description
Microsoft Intune for Android Mobile Application Management Tampering Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-30059 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Intune Mobile Application Management (MAM) for Android, specifically version 1.0. The flaw allows a user with limited privileges (low-level privileges) to tamper with the mobile application management controls that Intune enforces on managed Android devices. The vulnerability does not require user interaction and can be exploited locally (AV:L), meaning the attacker must have local access to the device but does not need elevated privileges beyond low-level permissions. The vulnerability impacts confidentiality significantly (C:H), while integrity is not affected (I:N), and availability impact is low (A:L). The scope remains unchanged (S:U), indicating the vulnerability affects only the vulnerable component without impacting other components. The exploitability is rated high (E:H), suggesting that once local access is obtained, exploitation is straightforward. The vulnerability has a CVSS 3.1 base score of 6.1, categorized as medium severity. No known exploits are currently reported in the wild. The vulnerability stems from improper access control mechanisms within the Intune MAM implementation, potentially allowing unauthorized access or manipulation of managed application policies or data, which could lead to exposure of sensitive corporate information or bypass of security controls enforced by Intune on Android devices.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality of corporate data managed via Microsoft Intune on Android devices. Since Intune is widely used for mobile device and application management in enterprises, especially those with Bring Your Own Device (BYOD) policies, exploitation could allow attackers with local device access to bypass management policies, extract sensitive data, or tamper with application configurations. This could lead to data leakage, violation of compliance requirements such as GDPR, and potential lateral movement within corporate networks if attackers leverage compromised devices. The limited impact on integrity and availability reduces the risk of direct disruption or data manipulation, but confidentiality breaches alone can have significant regulatory and reputational consequences. The requirement for local access and low privileges means that attackers would likely need physical access or prior compromise of the device, limiting remote exploitation but increasing risk in scenarios of lost or stolen devices or insider threats.
Mitigation Recommendations
1. Ensure all Android devices managed by Microsoft Intune are updated to versions beyond 1.0 where this vulnerability is addressed, as soon as patches become available. 2. Enforce strong device access controls such as biometric or PIN authentication to reduce risk from local attackers. 3. Implement strict device enrollment and compliance policies within Intune to detect and remediate tampering attempts. 4. Use conditional access policies to restrict access to sensitive corporate resources from devices that do not meet compliance standards. 5. Educate users on the risks of device loss and encourage immediate reporting and remote wipe capabilities. 6. Monitor device logs and Intune management alerts for unusual activity indicative of tampering or policy bypass attempts. 7. Consider additional endpoint protection solutions that can detect unauthorized changes to mobile application management configurations. These steps go beyond generic patching advice by emphasizing layered security controls, user awareness, and proactive monitoring tailored to the specific nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-03-22T23:12:14.565Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb783
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 4:29:45 AM
Last updated: 8/15/2025, 6:53:13 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.