CVE-2024-2998909.04.2024, 17:16Azure Monitor Agent Elevation of Privilege VulnerabilityLink FollowingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST8.4 HIGHLOCALLOWLOWCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:HmicrosoftCNA8.4 HIGHCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:CCISA-ADPADP------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 63%VendorProductVersionmicrosoftazure_monitor_agent𝑥< 1.24.0𝑥= Vulnerable software versionsCommon Weakness EnumerationCWE-59 - Improper Link Resolution Before File Access ('Link Following')The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Referenceshttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29989https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29989