CVE-2025-24049
Published: 11 March 2025
Summary
CVE-2025-24049 is a high-severity Command Injection (CWE-77) vulnerability in Microsoft Azure Command-Line Interface. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 26.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses command injection (CWE-77) by requiring validation mechanisms to neutralize special elements in inputs to the Azure CLI.
Enables timely remediation of the specific flaw in Azure CLI through monitoring advisories and applying patches as detailed in Microsoft's security advisory.
Mitigates the impact of local privilege escalation by enforcing least privilege, limiting the scope of damage even if injection succeeds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability in Azure CLI directly enables arbitrary command execution via T1059 and local privilege escalation via T1068.
NVD Description
Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2025-24049 is a command injection vulnerability (CWE-77) in Azure Command Line Integration (CLI), resulting from improper neutralization of special elements used in a command. This flaw affects the Azure CLI component and was published on 2025-03-11, carrying a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A local attacker requires no privileges (PR:N) to exploit the vulnerability, which demands low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation enables local privilege escalation, granting high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) without changing scope (S:U).
Microsoft's security advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049 details mitigation strategies and available patches.
Details
- CWE(s)