CVE-2026-32211

| EUVD-2026-18560 CRITICAL
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

3
Analysis Generated
Apr 03, 2026 - 00:22 vuln.today
EUVD ID Assigned
Apr 03, 2026 - 00:22 euvd
EUVD-2026-18560
CVE Published
Apr 03, 2026 - 00:16 nvd
CRITICAL 9.1

Description

Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.

Analysis

Unauthenticated information disclosure in Azure MCP Server allows remote attackers to access sensitive data over the network without authentication. The vulnerability stems from missing authentication controls on critical functions (CWE-306), enabling attackers to bypass security boundaries and extract confidential information with minimal complexity. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Immediately inventory all Azure MCP Server deployments and document versions; restrict network access to Azure MCP Server instances to trusted networks only using firewall or network segmentation. Within 7 days: Implement network-level controls such as VPN-gating, IP allowlisting, or WAF rules to block unauthenticated access; conduct audit logs for suspicious access patterns. …

Sign in for detailed remediation steps.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +46
POC: 0

Share

CVE-2026-32211 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy