Azure

27 CVEs product

Monthly

CVE-2026-31957 CRITICAL Act Now

Default password in Himmelblau Azure Entra ID suite 3.0.0-3.0.x. CVSS 10.0.

Azure
NVD GitHub VulDB
CVSS 3.1
10.0
EPSS
0.2%
CVE-2026-23664 HIGH PATCH This Week

Azure IoT Explorer fails to properly restrict communication to intended endpoints, enabling unauthenticated attackers to intercept and disclose sensitive information over the network. The vulnerability requires no user interaction and can be exploited remotely with a CVSS score of 7.5. A patch is available for affected Azure IoT products.

Azure IoT Azure Iot Explorer
NVD VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-23662 HIGH PATCH This Week

Azure IoT Explorer fails to enforce authentication on a critical function, enabling unauthenticated network attackers to remotely access and exfiltrate sensitive information. This high-severity vulnerability (CVSS 7.5) affects Azure IoT deployments and requires immediate patching to prevent unauthorized disclosure of IoT configuration and operational data. A patch is available.

Azure IoT Azure Iot Explorer
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-23661 HIGH PATCH This Week

Sensitive data transmission over cleartext in Azure IoT Explorer enables network-based attackers to intercept and disclose confidential information without authentication. This vulnerability affects Azure IoT deployments and could expose device credentials, configuration details, or other sensitive metadata to passive network observers. A patch is available to remediate the cleartext transmission issue.

Azure IoT Azure Iot Explorer
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-3224 CRITICAL Act Now

Azure AD auth bypass in Devolutions Server 2025.3.15.0 and earlier.

Azure Authentication Bypass Devolutions Server
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-2628 CRITICAL Act Now

Auth bypass in All-in-One Microsoft 365 SSO WordPress plugin.

WordPress Azure Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-27640 HIGH This Week

tfplan2md versions before 1.26.1 fail to properly mask sensitive values in Terraform plan reports across multiple rendering paths, causing credentials and other confidential data to be exposed in plaintext markdown output instead of being redacted. Administrators and developers using affected versions to generate infrastructure reports may inadvertently expose secrets to unauthorized parties with access to the generated documentation. No patch is currently available for this high-severity information disclosure vulnerability affecting Azure and Terraform workflows.

Azure Tfplan2md
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-22048 HIGH This Week

Configuration deletion and resource denial in StorageGRID versions before 11.9.0.12 and 12.0.0.4 stems from an SSRF flaw in Microsoft Entra ID SSO integration, allowing authenticated attackers to manipulate backend requests. Successful exploitation enables deletion of configuration data or denial of access to storage resources despite requiring valid credentials to initiate the attack.

Azure SSRF
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-23655 MEDIUM This Month

Confidential Sidecar Containers is affected by cleartext storage of sensitive information (CVSS 6.5).

Azure Confidential Sidecar Containers
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-21531 CRITICAL PATCH Act Now

Deserialization of untrusted data in Azure SDK allows unauthorized code execution over a network. EPSS 0.32%.

Azure Deserialization Azure Conversation Authoring Client Library
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-21529 MEDIUM This Month

Azure HDInsight contains a cross-site scripting (XSS) vulnerability in web page generation that allows authenticated attackers to conduct spoofing attacks over the network. An attacker with valid credentials and user interaction can exploit this weakness to manipulate web content and deceive users. No patch is currently available for this issue.

Azure XSS Azure Hdinsight
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-21528 MEDIUM This Month

Azure IoT Explorer binds to unrestricted IP addresses, enabling unauthenticated remote attackers to intercept and disclose sensitive information over the network. This vulnerability affects Azure IoT deployments where the Explorer tool is exposed without proper network segmentation. No patch is currently available, making network isolation the primary mitigation strategy.

Azure IoT Azure Iot Explorer
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-21522 MEDIUM This Month

Azure Compute Gallery contains a command injection vulnerability that enables authorized users to execute arbitrary commands with elevated privileges on local systems. The flaw requires high-level privileges to exploit and affects confidentiality, integrity, and availability of the target system. No patch is currently available.

Azure Command Injection Confcom
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2026-21512 MEDIUM This Month

Authenticated users of Azure and Azure DevOps Server can exploit a server-side request forgery vulnerability to perform network-based spoofing attacks. This MEDIUM severity issue (CVSS 6.5) requires valid credentials but allows attackers to manipulate the server into making unauthorized requests, potentially compromising confidentiality. No patch is currently available.

Azure SSRF Azure Devops Server
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-21228 HIGH This Week

Remote code execution in Azure Local stems from improper certificate validation, enabling unauthenticated attackers to execute arbitrary code over the network without user interaction. This HIGH severity vulnerability (CVSS 8.1) affects Azure and Azure Local deployments, with no patch currently available. Organizations using these products face immediate risk of compromise through network-based attacks exploiting this validation bypass.

Azure Azure Local
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-24300 CRITICAL Act Now

Elevation of privilege vulnerability in Azure Front Door allows attackers to gain elevated access. Microsoft Azure cloud service vulnerability affecting CDN/WAF infrastructure.

Azure Azure Front Door
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-21532 HIGH This Week

Azure Function Information Disclosure Vulnerability [CVSS 8.2 HIGH]

Azure Information Disclosure Azure Functions
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-23889 MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure Github Path Traversal +2
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24304 CRITICAL Act Now

Azure Resource Manager has a CVSS 9.9 access control vulnerability allowing authorized users to escalate privileges across Azure subscriptions and resource groups.

Azure Azure Resource Manager
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-24306 CRITICAL Act Now

Azure Front Door has an improper access control vulnerability (CVSS 9.8) allowing unauthorized attackers to elevate privileges through the CDN and WAF infrastructure.

Azure Azure Front Door
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-24305 CRITICAL Act Now

Azure Entra ID (formerly Azure AD) has an elevation of privilege vulnerability allowing attackers to escalate permissions within the identity platform.

Azure Entra Id
NVD
CVSS 3.1
9.3
EPSS
0.1%
CVE-2026-21524 HIGH This Week

Azure Data Explorer exposes sensitive information to unauthenticated remote attackers through a network-accessible vulnerability requiring only user interaction. An attacker can retrieve confidential data without authorization, potentially compromising customer information stored in affected Azure deployments. No patch is currently available for this high-severity vulnerability.

Azure Azure Data Explorer
NVD
CVSS 3.1
7.4
EPSS
0.1%
CVE-2026-21227 HIGH This Week

Privilege escalation in Azure Logic Apps results from improper path validation, enabling remote attackers to gain elevated access without authentication or user interaction. Organizations using Azure Logic Apps are at risk of unauthorized privilege elevation through network-based attacks, with no available patch currently provided.

Azure Path Traversal Azure Logic Apps
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2026-23518 CRITICAL PATCH Act Now

Fleet device management software has a signature verification bypass that allows attackers to install malicious firmware on managed devices across the fleet.

Windows Azure Fleet Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-21226 HIGH PATCH This Week

Remote code execution in Azure Core Shared Client Library for Python results from insecure deserialization of untrusted data, allowing authenticated network-based attackers to achieve arbitrary code execution. The vulnerability affects Python applications utilizing the vulnerable library versions, with no patch currently available. This represents a high-severity risk for Azure SDK consumers handling external or user-supplied serialized data.

Python Azure Deserialization Azure Core Shared Client Library Suse
NVD
CVSS 3.1
7.5
EPSS
1.5%
CVE-2026-21224 HIGH This Week

Local privilege escalation in Azure Connected Machine Agent exploits a stack-based buffer overflow, enabling authenticated users to gain elevated system privileges. The vulnerability affects Azure and Stack Overflow deployments and requires local access with valid credentials to exploit. No patch is currently available for this high-severity issue.

Azure Buffer Overflow Stack Overflow Azure Connected Machine Agent
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-20286 CRITICAL Act Now

Default credentials in Cisco ISE cloud deployments on AWS/Azure/OCI. CVSS 9.9.

Cisco Oracle Information Disclosure Authentication Bypass Azure +2
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-31957
EPSS 0% CVSS 10.0
CRITICAL Act Now

Default password in Himmelblau Azure Entra ID suite 3.0.0-3.0.x. CVSS 10.0.

Azure
NVD GitHub VulDB
CVE-2026-23664
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Azure IoT Explorer fails to properly restrict communication to intended endpoints, enabling unauthenticated attackers to intercept and disclose sensitive information over the network. The vulnerability requires no user interaction and can be exploited remotely with a CVSS score of 7.5. A patch is available for affected Azure IoT products.

Azure IoT Azure Iot Explorer
NVD VulDB
CVE-2026-23662
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Azure IoT Explorer fails to enforce authentication on a critical function, enabling unauthenticated network attackers to remotely access and exfiltrate sensitive information. This high-severity vulnerability (CVSS 7.5) affects Azure IoT deployments and requires immediate patching to prevent unauthorized disclosure of IoT configuration and operational data. A patch is available.

Azure IoT Azure Iot Explorer
NVD VulDB
CVE-2026-23661
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Sensitive data transmission over cleartext in Azure IoT Explorer enables network-based attackers to intercept and disclose confidential information without authentication. This vulnerability affects Azure IoT deployments and could expose device credentials, configuration details, or other sensitive metadata to passive network observers. A patch is available to remediate the cleartext transmission issue.

Azure IoT Azure Iot Explorer
NVD VulDB
CVE-2026-3224
EPSS 0% CVSS 9.8
CRITICAL Act Now

Azure AD auth bypass in Devolutions Server 2025.3.15.0 and earlier.

Azure Authentication Bypass Devolutions Server
NVD
CVE-2026-2628
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in All-in-One Microsoft 365 SSO WordPress plugin.

WordPress Azure Authentication Bypass
NVD
CVE-2026-27640
EPSS 0% CVSS 7.5
HIGH This Week

tfplan2md versions before 1.26.1 fail to properly mask sensitive values in Terraform plan reports across multiple rendering paths, causing credentials and other confidential data to be exposed in plaintext markdown output instead of being redacted. Administrators and developers using affected versions to generate infrastructure reports may inadvertently expose secrets to unauthorized parties with access to the generated documentation. No patch is currently available for this high-severity information disclosure vulnerability affecting Azure and Terraform workflows.

Azure Tfplan2md
NVD GitHub
CVE-2026-22048
EPSS 0% CVSS 7.1
HIGH This Week

Configuration deletion and resource denial in StorageGRID versions before 11.9.0.12 and 12.0.0.4 stems from an SSRF flaw in Microsoft Entra ID SSO integration, allowing authenticated attackers to manipulate backend requests. Successful exploitation enables deletion of configuration data or denial of access to storage resources despite requiring valid credentials to initiate the attack.

Azure SSRF
NVD
CVE-2026-23655
EPSS 0% CVSS 6.5
MEDIUM This Month

Confidential Sidecar Containers is affected by cleartext storage of sensitive information (CVSS 6.5).

Azure Confidential Sidecar Containers
NVD
CVE-2026-21531
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Deserialization of untrusted data in Azure SDK allows unauthorized code execution over a network. EPSS 0.32%.

Azure Deserialization Azure Conversation Authoring Client Library
NVD
CVE-2026-21529
EPSS 0% CVSS 5.7
MEDIUM This Month

Azure HDInsight contains a cross-site scripting (XSS) vulnerability in web page generation that allows authenticated attackers to conduct spoofing attacks over the network. An attacker with valid credentials and user interaction can exploit this weakness to manipulate web content and deceive users. No patch is currently available for this issue.

Azure XSS Azure Hdinsight
NVD
CVE-2026-21528
EPSS 0% CVSS 6.5
MEDIUM This Month

Azure IoT Explorer binds to unrestricted IP addresses, enabling unauthenticated remote attackers to intercept and disclose sensitive information over the network. This vulnerability affects Azure IoT deployments where the Explorer tool is exposed without proper network segmentation. No patch is currently available, making network isolation the primary mitigation strategy.

Azure IoT Azure Iot Explorer
NVD
CVE-2026-21522
EPSS 0% CVSS 6.7
MEDIUM This Month

Azure Compute Gallery contains a command injection vulnerability that enables authorized users to execute arbitrary commands with elevated privileges on local systems. The flaw requires high-level privileges to exploit and affects confidentiality, integrity, and availability of the target system. No patch is currently available.

Azure Command Injection Confcom
NVD
CVE-2026-21512
EPSS 0% CVSS 6.5
MEDIUM This Month

Authenticated users of Azure and Azure DevOps Server can exploit a server-side request forgery vulnerability to perform network-based spoofing attacks. This MEDIUM severity issue (CVSS 6.5) requires valid credentials but allows attackers to manipulate the server into making unauthorized requests, potentially compromising confidentiality. No patch is currently available.

Azure SSRF Azure Devops Server
NVD
CVE-2026-21228
EPSS 0% CVSS 8.1
HIGH This Week

Remote code execution in Azure Local stems from improper certificate validation, enabling unauthenticated attackers to execute arbitrary code over the network without user interaction. This HIGH severity vulnerability (CVSS 8.1) affects Azure and Azure Local deployments, with no patch currently available. Organizations using these products face immediate risk of compromise through network-based attacks exploiting this validation bypass.

Azure Azure Local
NVD
CVE-2026-24300
EPSS 0% CVSS 9.8
CRITICAL Act Now

Elevation of privilege vulnerability in Azure Front Door allows attackers to gain elevated access. Microsoft Azure cloud service vulnerability affecting CDN/WAF infrastructure.

Azure Azure Front Door
NVD
CVE-2026-21532
EPSS 0% CVSS 8.2
HIGH This Week

Azure Function Information Disclosure Vulnerability [CVSS 8.2 HIGH]

Azure Information Disclosure Azure Functions
NVD
CVE-2026-23889
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure +4
NVD GitHub
CVE-2026-24304
EPSS 0% CVSS 9.9
CRITICAL Act Now

Azure Resource Manager has a CVSS 9.9 access control vulnerability allowing authorized users to escalate privileges across Azure subscriptions and resource groups.

Azure Azure Resource Manager
NVD
CVE-2026-24306
EPSS 0% CVSS 9.8
CRITICAL Act Now

Azure Front Door has an improper access control vulnerability (CVSS 9.8) allowing unauthorized attackers to elevate privileges through the CDN and WAF infrastructure.

Azure Azure Front Door
NVD
CVE-2026-24305
EPSS 0% CVSS 9.3
CRITICAL Act Now

Azure Entra ID (formerly Azure AD) has an elevation of privilege vulnerability allowing attackers to escalate permissions within the identity platform.

Azure Entra Id
NVD
CVE-2026-21524
EPSS 0% CVSS 7.4
HIGH This Week

Azure Data Explorer exposes sensitive information to unauthenticated remote attackers through a network-accessible vulnerability requiring only user interaction. An attacker can retrieve confidential data without authorization, potentially compromising customer information stored in affected Azure deployments. No patch is currently available for this high-severity vulnerability.

Azure Azure Data Explorer
NVD
CVE-2026-21227
EPSS 0% CVSS 8.2
HIGH This Week

Privilege escalation in Azure Logic Apps results from improper path validation, enabling remote attackers to gain elevated access without authentication or user interaction. Organizations using Azure Logic Apps are at risk of unauthorized privilege elevation through network-based attacks, with no available patch currently provided.

Azure Path Traversal Azure Logic Apps
NVD
CVE-2026-23518
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Fleet device management software has a signature verification bypass that allows attackers to install malicious firmware on managed devices across the fleet.

Windows Azure Fleet +1
NVD GitHub
CVE-2026-21226
EPSS 1% CVSS 7.5
HIGH PATCH This Week

Remote code execution in Azure Core Shared Client Library for Python results from insecure deserialization of untrusted data, allowing authenticated network-based attackers to achieve arbitrary code execution. The vulnerability affects Python applications utilizing the vulnerable library versions, with no patch currently available. This represents a high-severity risk for Azure SDK consumers handling external or user-supplied serialized data.

Python Azure Deserialization +2
NVD
CVE-2026-21224
EPSS 0% CVSS 7.8
HIGH This Week

Local privilege escalation in Azure Connected Machine Agent exploits a stack-based buffer overflow, enabling authenticated users to gain elevated system privileges. The vulnerability affects Azure and Stack Overflow deployments and requires local access with valid credentials to exploit. No patch is currently available for this high-severity issue.

Azure Buffer Overflow Stack Overflow +1
NVD
CVE-2025-20286
EPSS 0% CVSS 9.9
CRITICAL Act Now

Default credentials in Cisco ISE cloud deployments on AWS/Azure/OCI. CVSS 9.9.

Cisco Oracle Information Disclosure +4
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy