Описание
Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
'.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
FAQ
Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?
This vulnerability has been mitigated by Microsoft in the Azure Confidential ACI service. No service update, patch, reboot, or upgrade is required.
For Azure Confidential ACI workloads, customers are expected to enforce existing Confidential Compute policies. Customers should verify that their Confidential Compute Environment (CCE) policy enforces the documented minimum Security Version Number (SVN) for infrastructure sidecar components, as described in the Confidential ACI configuration guidance.
If a customer finds that their policy configuration does not align with the published minimum SVN guidance, updating the configuration is considered standard policy enforcement and not a vulnerability‑specific remediation. No additional customer action is required beyond following existing guidance.
Please refer to the follwoing for more information: https://github.com/microsoft/confidential-aci-examples/blob/main/docs/Confidential_ACI_SCHEME.md
Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?
This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.
Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
6.7 Medium
CVSS3
Связанные уязвимости
'.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
EPSS
6.7 Medium
CVSS3