During an engagement, a penetration tester is analyzing an Azure environment and notices that the metadata service for a virtual machine is accessible without proper restrictions. What type of attack could be attempted to exploit this service misconfiguration?
Metadata service attack
Account takeover
Privilege escalation
Misconfigured cloud assets