Saturday, May 24, 2025
HomeCyber Security NewsAzure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s AI and High-Performance Computing (HPC) workloads to a potential privilege escalation attack.

The flaw, found in a utility pre-installed on select Azure Linux virtual machines, made it possible for an unprivileged local user to gain root access-a severe breach of the principle of least privilege.

The Heart of the Vulnerability: AZNFS-mount Utility

According to the Varonis report, The AZNFS-mount utility, designed for mounting Azure Blob Storage containers via the Network File System (NFS) protocol, is at the center of this issue.

- Advertisement - Google News

This tool comes pre-packaged on many Azure HPC/AI images to simplify access to large-scale, unstructured data on the cloud.

However, all versions released before 2.0.11 are affected by a classic privilege escalation vector: a misconfigured Set User ID (SUID) binary.

SUID binaries are powerful tools in Linux systems, as they execute with the file owner’s privileges-in this case, root-regardless of who launches them.

While this is sometimes necessary for system operations, it also creates a tempting target for attackers.

Snippet of code creating the release package for version 2.0.10 of AZNFS-mountCode-Snippet

Code Flaw Exposes Root Privileges

The vulnerable component, mount.aznfs, called a shell script via the execv function, preserving user-controlled environment variables.

Before invoking the shell, it explicitly set its real user ID to root (UID 0). This sequence allowed attackers to manipulate the BASH_ENV variable to execute arbitrary commands as root whenever mount.aznfs was called.

To exploit the flaw, an attacker would set the BASH_ENV environment variable to a malicious script or command and then trigger the SUID binary.

Bash would then execute the attacker’s code with full root privileges, opening the door to system compromise, lateral movement, and potentially disruptive activity such as ransomware installation.

Source code for version 2.0.10 of mount.aznfs 
Source code for version 2.0.10 of mount.aznfs 

Impact and Mitigation

Privilege escalation vulnerabilities are especially dangerous in shared or multi-user environments, such as cloud virtual machines. In this case, an attacker could have:

  • Mounted additional sensitive Azure Storage containers,
  • Modified system binaries or configurations,
  • Deployed malware or ransomware,
  • Or pivoted elsewhere in the cloud network.

Microsoft swiftly addressed the issue after the disclosure. The vulnerability was assigned a low severity rating, largely because a user needed local access to exploit it.

Still, a fix was released in version 2.0.11 of AZNFS-mount, and users are strongly advised to upgrade immediately.

Cloud security experts advise regular reviews of privilege assignments and vigilant patching. As this advisory highlights, even trusted tools can become attack vectors.

Users should ensure that any Azure VM using NFS endpoints with Blob Storage has applied the latest updates and restrict access to trusted individuals.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...