Query Details
// Git Critical Vulnerability CVE-2024-32002 // https://www.linkedin.com/posts/activity-7197478049729110016-TGar/ // Git is a widely-popular distributed version control system for collaborative software development. Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002). // Privilege Role Admin with vulnerable Git: let CriticalIdentities = ExposureGraphNodes | where set_has_element(Categories, "identity") | where isnotnull(NodeProperties.rawData.criticalityLevel) and NodeProperties.rawData.criticalityLevel.criticalityLevel < 4 | distinct NodeName; let CriticalDevices = ExposureGraphEdges | where EdgeLabel == @"can authenticate to" | join ExposureGraphNodes on $left.TargetNodeId==$right.NodeId | extend DName = tostring(NodeProperties.rawData.deviceName) | extend isLocalAdmin = EdgeProperties.rawData.userRightsOnDevice.isLocalAdmin | where SourceNodeName has_any (CriticalIdentities) | distinct DName; DeviceTvmSoftwareVulnerabilities | where CveId == "CVE-2024-32002" | where DeviceName has_any (CriticalDevices)
This KQL (Kusto Query Language) query is designed to identify devices that are vulnerable to a specific critical Git vulnerability (CVE-2024-32002) and are accessible by privileged identities. Here's a simplified summary of what the query does:
Identify Critical Identities:
Identify Devices Accessible by Critical Identities:
Find Vulnerable Devices:
In essence, the query identifies high-privilege identities, determines which devices they can access with admin rights, and then checks if those devices are vulnerable to the specified Git vulnerability.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators