• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
azure service tags vulnerability: microsoft warns of potential abuse by

Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers

You are here: Home / General Cyber Security News / Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers
June 10, 2024

Microsoft is warning about the probable abuse of Azure Services Tags by destructive actors to forge requests from a trusted provider and get about firewall guidelines, thus allowing for them to get unauthorized entry to cloud means.

“This scenario does emphasize an inherent risk in making use of company tags as a single mechanism for vetting incoming network website traffic,” the Microsoft Security Response Centre (MSRC) said in a advice issued past 7 days.

“Service tags are not to be addressed as a security boundary and really should only be employed as a routing system in conjunction with validation controls. Assistance tags are not a complete way to secure site visitors to a customer’s origin and do not replace enter validation to protect against vulnerabilities that could be related with web requests.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The assertion comes in response to findings from cybersecurity firm Tenable, which found that Azure clients whose firewall regulations count on Azure Service Tags could be bypassed. There is no proof that the attribute has been exploited in the wild.

The challenge, at its main, stems from the actuality that some of the Azure expert services enable inbound site visitors by using a provider tag, potentially letting an attacker in one tenant to send out specifically crafted web requests to access methods in another, assuming it has been configured to enable website traffic from the provider tag and does not perform any authentication of its have.

At 10 Azure solutions have been uncovered vulnerable: Azure Software Insights, Azure DevOps, Azure Machine Studying, Azure Logic Applications, Azure Container Registry, Azure Load Screening, Azure API Administration, Azure Knowledge Manufacturing unit, Azure Action Team, Azure AI Video clip Indexer, and Azure Chaos Studio.

“This vulnerability allows an attacker to management server-facet requests, as a result impersonating reliable Azure providers,” Tenable researcher Liv Matan mentioned. “This enables the attacker to bypass network controls based mostly on Company Tags, which are often made use of to prevent community entry to Azure customers’ inner belongings, data, and products and services.”

In reaction to the disclosure in late January 2024, Microsoft has up-to-date the documentation to explicitly note that “Service Tags alone aren’t sufficient to secure traffic devoid of looking at the nature of the provider and the traffic it sends.”

It really is also advised that consumers evaluate their use of services tags and guarantee they have adopted sufficient security guardrails to authenticate only dependable network targeted visitors for provider tags.

Located this report exciting? Adhere to us on Twitter  and LinkedIn to go through a lot more special articles we submit.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «google takes down influence campaigns tied to china, indonesia, and Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia
Next Post: Cybersecurity CPEs: Unraveling the What, Why & How cybersecurity cpes: unraveling the what, why & how»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.