Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-59292

Опубликовано: 14 окт. 2025
Источник: msrc
CVSS3: 8.2
EPSS Низкий

Описание

Azure Compute Gallery Elevation of Privilege Vulnerability

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker could gain code execution within the confidential ACI sidecar container, escalating from host control to confidential containers.

How could an attacker exploit this vulnerability?

An attacker could trick the system into mounting a malicious file share to a sensitive location, allowing them to run harmful code.

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

A successful attack allows the container host to execute code in the targeted guest environment.

What actions need to be taken to mitigate this vulnerability?

To ensure secure and compliant use of Confidential virtual nodes on Azure Container Instances, customers must take the following actions:

1. Update Helm Charts

2. Regenerate CCE Policy

If you are using Confidential ACI or Confidential virtual nodes, you must regenerate your Confidential Compute Environment (CCE) policy with a minimum infrastructure fragment SVN of 4.

To do this:

1. Update the Azure CLI confcom extension to version 1.2.8 or later:

  • *az extension update --name confcomShow more lines*

Alternatively, you can manually set the infrastructure SVN using:

  • *--infrastructure-svn 4*

2. Regenerate the CCE policy using either an ARM template or YAML file, depending on your deployment method.

3. Update any dependent key release policies, such as those using x-ms-sevsnpvm-hostdata claim checks in a Managed HSM (mHSM) key release policy.

4. Re-deploy your workload to apply the updated policy and configuration.

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 31%
0.00115
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
20 дней назад

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

CVSS3: 8.2
github
20 дней назад

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

CVSS3: 8.2
fstec
21 день назад

Уязвимость программного средства для создания и управления образов виртуальных машин (VM) и контейнеров Azure Compute Gallery, связанная с некорректным внешним управлением именем или путем файла, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 31%
0.00115
Низкий

8.2 High

CVSS3