Cyber Posture

CVE-2026-24302

High

Published: 05 February 2026

Published
05 February 2026
Modified
10 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0011 28.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24302 is a high-severity Improper Access Control (CWE-284) vulnerability in Microsoft Azure Arc. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 28.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly preventing unauthorized privilege elevation due to improper access control in Azure Arc.

prevent

Employs least privilege principle to restrict access to only necessary permissions, mitigating privilege escalation by unauthorized network attackers.

prevent

Provides capability for correct access control decisions based on user identity and roles, countering the improper access control vulnerability allowing no-privilege attackers to elevate.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Explicitly described as an Elevation of Privilege vulnerability enabling privilege escalation, directly mapping to T1068: Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper access control in Azure Arc allows an unauthorized attacker to elevate privileges over a network.

Deeper analysisAI

CVE-2026-24302 is an improper access control vulnerability affecting Azure Arc. Published on 2026-02-05, it stems from CWE-284 and carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), indicating high severity due to network accessibility, low complexity, no prerequisites, and significant confidentiality impact with a changed scope.

An unauthorized attacker (PR:N) can exploit this vulnerability remotely over the network (AV:N) without user interaction (UI:N). Successful exploitation allows the attacker to elevate privileges, enabling high-level confidentiality breaches (C:H) within the expanded scope (S:C).

The Microsoft Security Response Center advisory provides details on mitigation and patches at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24302.

Details

CWE(s)

Affected Products

microsoft
azure arc
all versions

CVEs Like This One

CVE-2026-27914Same vendor: Microsoft
CVE-2025-59230Same vendor: Microsoft
CVE-2026-23660Same vendor: Microsoft
CVE-2026-24303Same vendor: Microsoft
CVE-2026-21238Same vendor: Microsoft
CVE-2025-54914Same vendor: Microsoft
CVE-2025-21359Same vendor: Microsoft
CVE-2025-21293Same vendor: Microsoft
CVE-2026-20929Same vendor: Microsoft
CVE-2025-24076Same vendor: Microsoft

References