Microsoft Identity Denial of service vulnerability
Released: Jan 9, 2024
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2024-21319
- Impact
- Denial of Service
- Max Severity
- Important
- Weakness
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 6.8 / 5.9Base score metrics: 6.8 / Temporal score metrics: 5.9
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
The attacker must have access to the public encrypt key registered with the IDP(Entra ID) for successful exploitation.
How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by crafting a malicious JSON Web Encryption (JWE) token with a high compression ratio. This token, when processed by a server, leads to excessive memory allocation and processing time during decompression, causing a denial-of-service (DoS) condition.
It's important to note that the attacker must have access to the public key registered with the IDP(AAD) for successful exploitation.
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
A scope change (S:C) in the CVSS metric indicates that successful exploitation of this vulnerability could extend beyond the immediate processing of malicious tokens, affecting the overall availability of the system by causing a denial-of-service (DoS) condition.
Acknowledgements
- Morgan Brown with Microsoft
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 5.7.0
- 7.1.2
- 5.7.0
- 6.34.0
- 7.1.2
- 6.34.0
- 17.8.4
- 17.4.15
- 17.6.11
- 17.2.23
Disclaimer
Revisions
Information published.