• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft azure services flaws could've exposed cloud resources to unauthorized

Microsoft Azure Services Flaws Could’ve Exposed Cloud Resources to Unauthorized Access

You are here: Home / General Cyber Security News / Microsoft Azure Services Flaws Could’ve Exposed Cloud Resources to Unauthorized Access
January 17, 2023

Four diverse Microsoft Azure products and services have been discovered vulnerable to server-aspect request forgery (SSRF) attacks that could be exploited to get unauthorized entry to cloud resources.

The security issues, which had been learned by Orca among Oct 8, 2022 and December 2, 2022 in Azure API Administration, Azure Functions, Azure Machine Understanding, and Azure Electronic Twins, have due to the fact been resolved by Microsoft.

“The found Azure SSRF vulnerabilities permitted an attacker to scan regional ports, discover new solutions, endpoints, and sensitive data files – providing valuable details on perhaps susceptible servers and services to exploit for initial entry and the location of sensitive data to focus on,” Orca researcher By Lidor Ben Shitrit claimed in a report shared with The Hacker News.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Two of the vulnerabilities impacting Azure Capabilities and Azure Electronic Twins could be abused without the need of demanding any authentication, enabling a danger actor to seize control of a server with no even obtaining an Azure account in the initially put.

SSRF attacks could have severe outcomes as they allow a malicious interloper to read or update inner methods, and even worse, pivot to other areas of the network, breach in any other case unreachable devices to extract beneficial information.

3 of the flaws are rated Essential in severity, whilst the SSRF flaw impacting Azure Equipment Discovering is rated Very low in severity. All the weaknesses can be leveraged to manipulate a server to mount more attacks against a inclined target.

A quick summary of the 4 vulnerabilities is as follow –

  • Unauthenticated SSRF on Azure Digital Twins Explorer by way of a flaw in the /proxy/blob endpoint that could be exploited to get a reaction from any service which is suffixed with “blob.main.windows[.]net”
  • Unauthenticated SSRF on Azure Functions that could be exploited to enumerate area ports and access interior endpoints
  • Authenticated SSRF on Azure API Management provider that could be exploited to listing interior ports, like one particular related with a resource code management company that could then be used to obtain sensitive documents
  • Authenticated SSRF on Azure Equipment Mastering provider via the /datacall/streamcontent endpoint that could be exploited to fetch material from arbitrary endpoints

To mitigate this kind of threats, corporations are suggested to validate all input, ensure that servers are configured to only allow essential inbound and outbound targeted visitors, steer clear of misconfigurations, and adhere to the principle of least privilege (PoLP).

“The most noteworthy facet of these discoveries is arguably the selection of SSRF vulnerabilities we ended up in a position to come across with only nominal exertion, indicating just how widespread they are and the risk they pose in cloud environments,” Ben Shitrit mentioned.

Uncovered this posting attention-grabbing? Adhere to us on Twitter  and LinkedIn to browse extra special content material we article.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «businesses must overhaul “outdated” recruitment mindset to tackle dearth of Businesses must overhaul “outdated” recruitment mindset to tackle dearth of privacy expertise
Next Post: Security experts develop method of generating ‘highly evasive’ polymorphic malware using ChatGPT security experts develop method of generating 'highly evasive' polymorphic malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.