Security
Headlines
HeadlinesLatestCVEs

Tag

#Azure

CVE-2025-30387: Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability

**What actions does a valid user have to take to be protected against this vulnerability?** Update the image to the latest tag. User data and setting will not be affected by upgrading to the latest tag.

Microsoft Security Response Center
#vulnerability#intel#Azure#Security Vulnerability
CVE-2025-33072: Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability

**Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?** This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.

CVE-2025-30390: Azure ML Compute Elevation of Privilege Vulnerability

**Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?** This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.

CVE-2024-29993: Azure CycleCloud Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** The attacker who successfully exploited this vulnerability could elevate privileges to the SuperUser role in the affected Azure CycleCloud instance.

CVE-2023-36021: Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability

**What kind of security feature could be bypassed by successfully exploiting this vulnerability?** An attacker who successfully exploited this vulnerability could bypass certificate validation mechanisms and provide arbitrary certificates that do not have proper signatures.

CVE-2023-36052: Azure CLI REST Command Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** An attacker that successfully exploited this vulnerability could recover plaintext passwords and usernames from log files created by the affected CLI commands and published by Azure DevOps and/or GitHub Actions.

CVE-2023-38151: Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability

**How could an attacker exploit this vulnerability?** Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the target machine if the victim connects to the attacker's malicious DB2 server and they execute a specially crafted query.

CVE-2023-36419: Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploited this vulnerability could gain cluster administrator privileges.

CVE-2023-36737: Azure Network Watcher VM Agent Elevation of Privilege Vulnerability

**What is Network Watcher?** Azure Network Watcher provides tools to monitor, diagnose, view metrics, and enable or disable logs for resources in an Azure virtual network. Network Watcher is designed to monitor and repair the network health of IaaS (Infrastructure-as-a-Service) products including Virtual Machines (VM), Virtual Networks, Application Gateways, Load balancers, etc. For more details, please refer to: What is Azure Network Watcher?.

CVE-2023-23408: Azure Apache Ambari Spoofing Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** An attacker would have to send the victim a malicious URL that the victim would have to execute.