Saturday, April 5, 2025
HomeAzureCritical RCE & Spoofing Vulnerabilities in Microsoft Azure Cloud Let Hackers Compromise...

Critical RCE & Spoofing Vulnerabilities in Microsoft Azure Cloud Let Hackers Compromise Microsoft’s Cloud Server

Published on

SIEM as a Service

Follow Us on Google News

Critical remote code execution and spoofing vulnerabilities that existed in the Microsoft Azure cloud infrastructure allow attackers to remotely exploiting the vulnerability and compromise the Azure cloud servers.

Researchers from checkpoint found an Azure Stack Spoofing vulnerability in Azure Stack where the certain request is failed to validate.

Microsoft Azure Stack is a hybrid cloud platform that enables you to use Azure services from your company or service provider datacenter.

Attackers taking advantage of this vulnerability and exploit the Azure Stack user portal by sending a specially crafted request.

Researchers from Checkpoint who have discovered this SSRF vulnerability, diving deep to Azure cloud and discussed this vulnerability in detail here.

Attackers who successfully exploit this vulnerability can take a screenshot of the sensitive information from the machine that runs under the Microsoft Azure cloud.

Microsoft fixed this vulnerability(CVE-2019-1234) and issued a security update changing how Azure Stack handles certain requests.

Azure Stack Remote Code Execution vulnerability

Researchers also discovered a critical remote code execution vulnerability in Azure App Service that let attackers run an unprivileged function by the user to execute code and escaping the sandbox in the context of NT AUTHORITY\system.

Azure App Service enables you to build and host web apps, mobile back ends, and RESTful APIs in the programming language of your choice, without managing infrastructure.

The vulnerability found in DWASSVC, a service responsible for managing and running tenant applications and once its exploited,it allowed attackers to execute code as NT AUTHORITY/SYSTEM.

According to Checkpoint research “Exploiting this vulnerability in all of the plans could allow us to compromise Microsoft’s App Service infrastructure. However, exploiting it specifically on a Free/Shared plan could also allow us to compromise other tenant apps, data, and accounts! Thus breaking the security model of App Service. “

Checkpoint disclosed the technical details about how they found this vulnerability architecture and attack vectors here.

Microsoft fixed the vulnerability (CVE-2019-1372) and issued a security update that addresses the vulnerability by ensuring that Azure Stack sanitizes user inputs.

Also Read:

Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the Azure Accounts

Microsoft Announced 16 New Roles to Enhance Azure Active Directory Security

Microsoft Launches Azure Security Lab, Bounty Reward for Researchers up to $40,000

Hackers Abusing Microsoft Azure to Deploy Malware and C2 Servers Using Evasion Technique

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials

Cybersecurity researchers have identified a growing trend in phishing attacks leveraging QR codes, a...

Microsoft Discovers GRUB2, U-Boot, and Barebox Bootloader Flaws with Copilot

Microsoft has disclosed the discovery of multiple critical vulnerabilities within the GRUB2, U-Boot, and...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...