Описание
Microsoft ACI Confidential Containers Information Disclosure Vulnerability
Initialization of a resource with an insecure default in Azure Compute Gallery allows an authorized attacker to disclose information over a network.
FAQ
Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?
This vulnerability has been mitigated by Microsoft in the Azure Confidential ACI service. No service update, patch, reboot, or upgrade is required.
This issue does not require customers to take any specific action beyond standard operation of Azure Confidential ACI. Existing Confidential Compute guidance continues to apply, and no additional policy checks or configuration changes are required for this vulnerability.
Customers can refer to the Confidential ACI configuration guidance to ensure they are following current platform recommendations.
Please refer to the follwoing for more information: https://github.com/microsoft/confidential-aci-examples/blob/main/docs/Confidential_ACI_SCHEME.md
Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?
This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.
Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
Initialization of a resource with an insecure default in Azure Compute Gallery allows an authorized attacker to disclose information over a network.
Microsoft ACI Confidential Containers Information Disclosure Vulnerability
EPSS
6.5 Medium
CVSS3