azure
-
A vulnerability was found in Microsoft Azure Arc and classified as critical. Affected by this issue is some unknown functionality of the component Installer. The manipulation leads to command injection. This vulnerability is handled as CVE-2025-26627. Local access is required to approach this attack. There is no exploit available. It is recommended to apply a…
-
A vulnerability classified as critical was found in Microsoft Azure Promptflow. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper isolation or compartmentalization. This vulnerability is known as CVE-2025-24986. The attack can be launched remotely. There is no exploit available. It is recommended to apply a patch to fix this issue.
-
Microsoft exposed four individuals behind an Azure Abuse scheme using unauthorized GenAI access to create harmful content. Microsoft shared the names of four developers of malicious tools designed to bypass the guardrails of generative AI services, including Microsoft’s Azure OpenAI Service. Microsoft is taking legal action against these defendants, dismantling their operation, and curbing misuse…
-
A vulnerability classified as problematic has been found in Microsoft Windows. This affects an unknown part of the component Mark of the Web. The manipulation leads to an unknown weakness. This vulnerability is uniquely identified as CVE-2022-41049. It is possible to initiate the attack remotely. Furthermore, there is an exploit available. It is recommended to…
-
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux kernel did not properly handle locking for rings with IOPOLL, leading to a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21400) Several security issues were discovered in the…
-
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: – Multiple devices driver; – Network drivers; – Mellanox network drivers; – S/390 drivers; – SCSI subsystem; – Sonic Silicon Backplane drivers; – File systems infrastructure; – Closures…
-
Discover how cybercriminals use ‘Infrastructure Laundering’ to exploit AWS and Azure for scams, phishing, and money laundering. Learn about FUNNULL CDN’s tactics and their global impact on businesses and cybersecurity.
-
Microsoft has integrated DeepSeek’s R1 model into its Azure AI Foundry platform and GitHub, allowing customers to experiment and deploy AI applications more efficiently. “One of the key advantages of using DeepSeek R1 or any other model on Azure AI Foundry is the speed at which developers can experiment, iterate, and integrate AI into their…
-
A detailed walkthrough demonstrates how attackers can manipulate Azure Key Vault’s access policies after compromising Entra ID (formerly Azure AD) credentials. According to Faran Siddiqui, a penetration tester report, a “Key Vault 06 – Abuse Decryption Key,” shed light on this critical vulnerability and the technique involving AzureAD CLI and Microsoft Graph API. The breakdown…
-
Originally published by Oasis Security.Written by Tal Hason.Oasis Security’s research team uncovered a critical vulnerability in Microsoft’s Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats,…
-
A vulnerability was found in Azure VM Agents Plugin up to 852.v8d35f0960a_43 on Jenkins. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. This vulnerability is traded as CVE-2023-32989. It is possible to launch the attack remotely. There is no exploit available.
-
Microsoft Azure AI/ML Studio Information Disclosure A security issue has been discovered within the Azure AI/ML Studio services that allows for low severity information disclosure. This issue allows for the generation of authentication tokens for the scopes of management.azure.com, storage.azure.com, graph.azure.com, and others. These tokens are generated for a subscription ID internal to Microsoft, rather than…
-
A vulnerability, which was classified as problematic, has been found in Microsoft Azure Identity Library for .NET. This issue affects some unknown processing. The manipulation leads to insufficiently protected credentials. The identification of this vulnerability is CVE-2024-29992. The attack needs to be approached locally. There is no exploit available. It is recommended to apply a…
-
A vulnerability classified as critical was found in Microsoft Azure Kubernetes Service Confidential Containers. This vulnerability affects unknown code. The manipulation leads to improper access controls. This vulnerability was named CVE-2024-29990. The attack can be initiated remotely. There is no exploit available. It is recommended to apply a patch to fix this issue.
-
A vulnerability classified as critical has been found in Microsoft Azure Monitor Agent. This affects an unknown part. The manipulation leads to link following. This vulnerability is uniquely identified as CVE-2024-29989. Attacking locally is a requirement. There is no exploit available. It is recommended to apply a patch to fix this issue.
-
– In this article we will see how managed identities can be abused. To know more about managed identities, please refer my other article.Continue reading on InfoSec Write-ups »
-
submitted by /u/digicat [link] [comments]