During an engagement, a penetration tester is analyzing an Azure environment and notices that the metadata service for a virtual machine is accessible without proper restrictions. What type of attack could be attempted to exploit this service misconfiguration?
Account takeover
Privilege escalation
Metadata service attack
Misconfigured cloud assets